CVE-2021-21032:
Magento Insufficient Session Expiration
5.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3767%
CWE
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.4.0, < 2.4.1-p1 | 2.4.1-p1 |
magento/community-edition | composer | < 2.3.6 | 2.3.6 |
magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on insufficient session invalidation. Magento's session termination mechanisms during logout/password changes are prime suspects. The Session::logout()
method and its caller in the Logout controller are critical points where improper session handling (e.g., missing session regeneration or cookie invalidation) could leave sessions active. While exact patch details are unavailable, these components align with CWE-613 patterns and Magento's session management architecture.