### [CVE-2021-25970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25970) ![](https://img.shields.io/static/v1?label=Product&message=camaleon_cms&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0.1.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-613%20Insufficient%20Session%20Expiration&color=brightgreen) ### Description Camaleon CMS 0.1.7 to 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25970 #### Github No PoCs found on GitHub currently.