CVE-2021-41274

Public Exploit
Authentication Bypass by CSRF Weakness

Description

solidus_auth_devise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidus_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: Executed whether as: A `before_action` callback (the default) or A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). Users should promptly update to `solidus_auth_devise` version `2.5.4`. Users unable to update should if possible, change their strategy to `:exception`. Please see the linked GHSA for more workaround details.

Category

9.3
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.11%
Third-Party Advisory github.com Third-Party Advisory github.com
Affected: solidusio solidus_auth_devise
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-41274?
CVE-2021-41274 has been scored as a critical severity vulnerability.
How to fix CVE-2021-41274?
To fix CVE-2021-41274, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-41274 being actively exploited in the wild?
It is possible that CVE-2021-41274 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-41274?
CVE-2021-41274 affects solidusio solidus_auth_devise.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.