{"api_version":"1","generated_at":"2026-04-23T07:56:59+00:00","cve":"CVE-2021-25985","urls":{"html":"https://cve.report/CVE-2021-25985","api":"https://cve.report/api/cve/CVE-2021-25985.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25985","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25985"},"summary":{"title":"CVE-2021-25985","description":"In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.","state":"PUBLIC","assigner":"vulnerabilitylab@whitesourcesoftware.com","published_at":"2021-11-16 10:15:00","updated_at":"2023-11-07 03:31:00"},"problem_types":["CWE-613"],"metrics":[],"references":[{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985","refsource":"MISC","tags":[],"title":"CVE-2021-25985 | WhiteSource Vulnerability Database","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65","name":"https://github.com/FactorJS/factor/blob/v1.8.30/%40factor/user/util.ts#L65","refsource":"","tags":[],"title":"factor/util.ts at v1.8.30 · FactorJS/factor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65","name":"https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65","refsource":"MISC","tags":[],"title":"factor/util.ts at v1.8.30 · FactorJS/factor · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25985","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25985","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"WhiteSource Vulnerability Research Team (WVR)","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25985","vulnerable":"1","versionEndIncluding":"1.8.30","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"darwin","cpe5":"factor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2021-25985","STATE":"PUBLIC","TITLE":"FactorJS - Insufficient Session Expiration Leads to a Local Account Takeover"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Factor","version":{"version_data":[{"version_affected":">=","version_value":"1.0.4"},{"version_affected":"<=","version_value":"1.8.30"}]}}]},"vendor_name":"FactorJS"}]}},"credit":[{"lang":"eng","value":"WhiteSource Vulnerability Research Team (WVR)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-613 Insufficient Session Expiration"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65","name":"https://github.com/FactorJS/factor/blob/v1.8.30/@factor/user/util.ts#L65"},{"refsource":"MISC","url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985","name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25985"}]},"solution":[{"lang":"eng","value":"Update to 3.0.1"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-11-16 10:15:00","lastModifiedDate":"2023-11-07 03:31:00","problem_types":["CWE-613"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:darwin:factor:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.0.4","versionEndIncluding":"1.8.30","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25985","Ordinal":"200912","Title":"CVE-2021-25985","CVE":"CVE-2021-25985","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25985","Ordinal":"1","NoteData":"In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25985","Ordinal":"2","NoteData":"2021-11-16","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25985","Ordinal":"3","NoteData":"2021-11-16","Type":"Other","Title":"Modified"}]}}}