{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2020-36948","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-01-25T13:50:01.143Z","datePublished":"2026-01-27T15:23:50.046Z","dateUpdated":"2026-03-05T01:27:04.698Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-05T01:27:04.698Z"},"datePublic":"2020-11-26T00:00:00.000Z","title":"VestaCP 0.9.8-26 - 'LoginAs' Insufficient Session Validation","descriptions":[{"lang":"en","value":"VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Incorrect Authorization","cweId":"CWE-863","type":"CWE"}]}],"affected":[{"vendor":"VestaCP","product":"VestaCP","versions":[{"version":"0.9.8-26","status":"affected"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vestacp:vesta_control_panel:0.9.8-26:*:*:*:*:*:*:*"}]}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/49219","name":"ExploitDB-49219","tags":["exploit"]},{"url":"https://vestacp.com/","name":"VestaCP Official Homepage","tags":["product"]},{"url":"https://www.vulnerability-lab.com/get_content.php?id=2240","name":"Vulnerability Lab Advisory","tags":["technical-description","exploit"]},{"url":"https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.","name":"Benjamin Kunz Mejri Profile","tags":["vendor-advisory"]},{"name":"VulnCheck Advisory: VestaCP 0.9.8-26 - 'LoginAs' Insufficient Session Validation","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/vestacp-loginas-insufficient-session-validation"}],"credits":[{"lang":"en","value":"Vulnerability-Lab","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"references":[{"url":"https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.","tags":["exploit"]},{"url":"https://www.exploit-db.com/exploits/49219","tags":["exploit"]},{"url":"https://www.vulnerability-lab.com/get_content.php?id=2240","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-27T21:07:57.516937Z","id":"CVE-2020-36948","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-27T21:36:26.071Z"}}]}}