Magneto-lts vulnerable to Cross-Site Request Forgery
Description
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2021-21395 is a CSRF vulnerability in OpenMage Magento LTS password reset, patched in versions 19.4.22 and 20.0.19.
Vulnerability
The password reset form in OpenMage Magento LTS (Long Term Support), a community-maintained fork of Magento CE, is vulnerable to Cross-Site Request Forgery (CSRF) [1][2]. The vulnerability exists in the window between the time a user clicks a password reset link and submits a new password. Versions prior to 19.4.22 and 20.0.19 are affected [1][2].
Exploitation
An attacker can exploit this by tricking an authenticated user who has requested a password reset into submitting a crafted request. The CSRF arises because the reset form lacks a unique token tied to the user's session between the initial link click and the final submission [3]. No authentication is needed for the CSRF attack itself; the user must have an active password reset session.
Impact
Successful exploitation could allow an attacker to change the victim's account password without their consent, potentially leading to account takeover [2][3]. This compromises the confidentiality and integrity of user accounts.
Mitigation
Patches are available in OpenMage LTS versions 19.4.22 and 20.0.19 [1][2]. There are no workarounds; upgrading to a patched version is required. The OpenMage project encourages migration from official Magento CE for ongoing security support [4].
- openmage/magento-lts - Packagist.org
- NVD - CVE-2021-21395
- Reset Password not protected against well-timed CSRF
- GitHub - OpenMage/magento-lts: Official OpenMage LTS codebase | Migrate easily from Magento Community Edition in minutes! Download the source code for free or contribute to OpenMage LTS | Security vulnerability patches, bug fixes, performance improvements and more.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openmage/magento-ltsPackagist | < 19.4.22 | 19.4.22 |
openmage/magento-ltsPackagist | >= 20.0.0, < 20.0.19 | 20.0.19 |
Affected products
2- OpenMage/magento-ltsv5Range: < 19.4.22
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-r3c9-9j5q-pwv4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-21395ghsaADVISORY
- github.com/OpenMage/magento-lts/releases/tag/v19.4.22ghsaWEB
- github.com/OpenMage/magento-lts/releases/tag/v20.0.19ghsaWEB
- github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4ghsax_refsource_CONFIRMWEB
- hackerone.com/reports/1086752ghsax_refsource_MISCWEB
- packagist.org/packages/openmage/magento-ltsghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.