Description
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Remediation
References
https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c
Related Vulnerabilities
CVE-2021-21353 Vulnerability in npm package pug-code-gen
CVE-2020-14340 Vulnerability in maven package org.jboss.xnio:xnio-nio
CVE-2021-40143 Vulnerability in maven package org.sonatype.nexus:nexus-repository
CVE-2021-40865 Vulnerability in maven package org.apache.storm:storm-server
CVE-2022-43403 Vulnerability in maven package org.jenkins-ci.plugins:script-security