{"api_version":"1","generated_at":"2026-05-13T11:43:23+00:00","cve":"CVE-2021-43834","urls":{"html":"https://cve.report/CVE-2021-43834","api":"https://cve.report/api/cve/CVE-2021-43834.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43834","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43834"},"summary":{"title":"CVE-2021-43834","description":"eLabFTW is an electronic lab notebook manager for research teams. In versions prior to 4.2.0 there is a vulnerability which allows an attacker to authenticate as an existing user, if that user was created using a single sign-on authentication option such as LDAP or SAML. It impacts instances where LDAP or SAML is used for authentication instead of the (default) local password mechanism. Users should upgrade to at least version 4.2.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-12-16 00:15:00","updated_at":"2021-12-21 15:58:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://github.com/elabftw/elabftw/releases/tag/4.2.0","name":"https://github.com/elabftw/elabftw/releases/tag/4.2.0","refsource":"MISC","tags":[],"title":"Release eLabFTW-4.2.0 · elabftw/elabftw · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph","name":"https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph","refsource":"CONFIRM","tags":[],"title":"Incorrect Implementation of Authentication Algorithm in elabftw · Advisory · elabftw/elabftw · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43834","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43834","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43834","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elabftw","cpe5":"elabftw","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43834","STATE":"PUBLIC","TITLE":"Incorrect Authentication in elabftw"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"elabftw","version":{"version_data":[{"version_value":"< 4.2.0"}]}}]},"vendor_name":"elabftw"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"eLabFTW is an electronic lab notebook manager for research teams. In versions prior to 4.2.0 there is a vulnerability which allows an attacker to authenticate as an existing user, if that user was created using a single sign-on authentication option such as LDAP or SAML. It impacts instances where LDAP or SAML is used for authentication instead of the (default) local password mechanism. Users should upgrade to at least version 4.2.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication"}]}]},"references":{"reference_data":[{"name":"https://github.com/elabftw/elabftw/releases/tag/4.2.0","refsource":"MISC","url":"https://github.com/elabftw/elabftw/releases/tag/4.2.0"},{"name":"https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph","refsource":"CONFIRM","url":"https://github.com/elabftw/elabftw/security/advisories/GHSA-98rp-gx76-33ph"}]},"source":{"advisory":"GHSA-98rp-gx76-33ph","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-12-16 00:15:00","lastModifiedDate":"2021-12-21 15:58:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:elabftw:elabftw:*:*:*:*:*:*:*:*","versionEndExcluding":"4.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43834","Ordinal":"221355","Title":"CVE-2021-43834","CVE":"CVE-2021-43834","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43834","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}