Home

Description

Concrete CMS version 9 before 9.2.8 and previous versions before 8.5.16 are vulnerable to Stored XSS in the Custom Class page editing. Prior to the fix, a rogue administrator could insert malicious code in the custom class field due to insufficient validation of administrator provided data. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Thanks Alexey Solovyev for reporting.

PUBLISHED Reserved 2024-04-02 | Published 2024-04-03 | Updated 2024-08-30 | Assigner ConcreteCMS




LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

9.0.0 (git) before 9.2.8
affected

5.0.0 (git) before 8.5.16
affected

Credits

Alexey Solovyev finder

References

documentation.concretecms.org/...y4xLjE3MTIxNjY3MDcuMC4wLjA.

documentation.concretecms.org/...y4xLjE3MTIxNjY2ODEuMC4wLjA.

cve.org (CVE-2024-3179)

nvd.nist.gov (CVE-2024-3179)

Download JSON