CVE-2021-26600
Description
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImpressCMS before 1.4.3 uses a loose comparison (!= instead of !==) in autologin.php, allowing authentication bypass via type juggling.
Vulnerability
In ImpressCMS versions prior to 1.4.3, the file plugins/preloads/autologin.php implements automatic login functionality based on cookie values autologin_uname and autologin_pass. The vulnerability lies in lines 62–63, where the password verification uses the loose comparison operator != instead of the strict !==. This allows type juggling, which can lead to authentication bypass [1][4].
Exploitation
An attacker must be able to send HTTP requests with crafted cookie values. The attacker sets the autologin_uname cookie to the username of a target user (e.g., an administrator) and the autologin_pass cookie to a specially crafted value that exploits PHP's type juggling. The vulnerable code compares a computed hash (using md5, ICMS_DB_PASS, ICMS_DB_PREFIX, and a timestamp) with the attacker-supplied value using !=. By choosing a value that, after type juggling, loosely equals the hash (e.g., a boolean true or a numeric string), the comparison can succeed without knowing the actual password [4].
Impact
Successful exploitation allows the attacker to bypass authentication and log in as any existing user, including administrators. This can lead to full compromise of the CMS, including arbitrary data access, content modification, and potential server-side code execution [1][4].
Mitigation
The vulnerability is fixed in ImpressCMS version 1.4.3, released on an unknown date but referenced in the release notes [2][3]. Users should upgrade to 1.4.3 or later immediately. No workaround is available, as the fix requires code change in the core. The CVE is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | < 1.4.3 | 1.4.3 |
Affected products
2- ImpressCMS/ImpressCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-m8xh-cqc2-5q6fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-26600ghsaADVISORY
- karmainsecurity.com/KIS-2022-01ghsax_refsource_MISCWEB
- packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2022/Mar/43ghsax_refsource_MISCWEB
- github.com/ImpressCMS/impresscms/releases/tag/v1.4.3ghsaWEB
- hackerone.com/reports/1081986ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.