
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-27913 is a security vulnerability discovered in Mautic, affecting versions prior to 3.3.4 and versions prior to 4.0.0. The vulnerability involves the use of the mt_rand function for generating session tokens, which is cryptographically flawed due to its pseudorandom nature (GitHub Advisory).
The vulnerability stems from the implementation of session token generation using the mt_rand() function in PHP. The function's pseudorandom nature makes it cryptographically insecure, allowing potential enumeration of session tokens. The vulnerability has been assigned a CVSS v3.1 score with the following metrics: Attack Vector: Network, Attack Complexity: Low, Privileges Required: Low, User Interaction: Required, Scope: Unchanged, Confidentiality: None, Integrity: None, Availability: Low (GitHub Advisory).
The vulnerability could allow an attacker to takeover accounts at random by enumerating and using access tokens. This security flaw potentially compromises the session management system of affected Mautic installations (GitHub Advisory).
The vulnerability has been patched in Mautic versions 3.3.4 and 4.0.0. Users are advised to upgrade to these or later versions to mitigate the security risk (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."