Miggo Logo

CVE-2021-26598: Incorrect Access Control in ImpressCMS

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.98431%
Published
3/29/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
impresscms/impresscmscomposer< 1.4.31.4.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the access control flow in findusers.php that first checks for a valid security token (lines 20-23) before checking admin status. Since tokens can be obtained without authentication (e.g., via misc.php), this allows unauthenticated attackers to bypass the intended access controls. The GitHub advisory and external analysis confirm this specific file's logic was patched in 1.4.3 by adding proper authentication checks alongside token validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Impr*ss*MS ***or* *.*.* **s In*orr**t ****ss *ontrol ****us* in*lu**/*in*us*rs.p*p *llows ****ss *y un*ut**nti**t** *tt**k*rs (w*o *r*, *y **si*n, **l* to **v* * s**urity tok*n).

Reasoning

T** vuln*r**ility st*ms *rom t** ****ss *ontrol *low in `*in*us*rs.p*p` t**t *irst ****ks *or * v*li* s**urity tok*n (lin*s **-**) ***or* ****kin* **min st*tus. Sin** tok*ns **n ** o*t*in** wit*out *ut**nti**tion (*.*., vi* `mis*.p*p`), t*is *llows u