{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T18:58:14.564","vulnerabilities":[{"cve":{"id":"CVE-2021-41126","sourceIdentifier":"security-advisories@github.com","published":"2021-10-06T18:15:11.013","lastModified":"2024-11-21T06:25:31.813","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"October is a Content Management System (CMS) and web platform built on the the Laravel PHP Framework. In affected versions administrator accounts which had previously been deleted may still be able to sign in to the backend using October CMS v2.0. The issue has been patched in v2.1.12 of the october/october package. There are no workarounds for this issue and all users should update."},{"lang":"es","value":"October es un Sistema de Administración de Contenidos (CMS) y una plataforma web construida sobre el framework PHP Laravel. En las versiones afectadas, las cuentas de administrador que habían sido eliminadas previamente pueden seguir siendo capaces de iniciar sesión en el backend usando October CMS versión v2.0. El problema ha sido parcheado en la versión 2.1.12 del paquete october/october. No se presentan soluciones para este problema y todos los usuarios deben actualizar"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.1.12","matchCriteriaId":"2CAD7006-27C1-493F-A50B-2508EDFD0793"}]}]}],"references":[{"url":"https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://octobercms.com/changelog","source":"security-advisories@github.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://octobercms.com/changelog","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}