{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T06:32:44.814","vulnerabilities":[{"cve":{"id":"CVE-2021-25985","sourceIdentifier":"vulnerabilitylab@mend.io","published":"2021-11-16T10:15:07.167","lastModified":"2024-11-21T05:55:44.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover."},{"lang":"es","value":"En Factor (App Framework &amp; Headless CMS) versiones v1.0.4 a v1.8.30, invalida inapropiadamente la sesión de un usuario incluso después de que éste cierre la sesión de la aplicación. Además, las sesiones de usuarios se guardan en el almacenamiento local del navegador, que por defecto no presenta un tiempo de caducidad. Esto hace posible a un atacante robar y reusar las cookies usando técnicas como los ataques de tipo XSS, seguidos de una toma de posesión de la cuenta local"}],"metrics":{"cvssMetricV31":[{"source":"vulnerabilitylab@mend.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnerabilitylab@mend.io","type":"Secondary","description":[{"lang":"en","value":"CWE-613"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:darwin:factor:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.0.4","versionEndIncluding":"1.8.30","matchCriteriaId":"8516D5DD-BC77-4028-A6B7-E89EB9F616DC"}]}]}],"references":[{"url":"https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65","source":"vulnerabilitylab@mend.io"},{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985","source":"vulnerabilitylab@mend.io","tags":["Third Party Advisory"]},{"url":"https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}