Concrete CMS in version 9 before 9.2.5 is vulnerable to reflected XSS via the Image URL Import Feature due to insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user’s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. This does not affect Concrete versions prior to version 9.
References
Link | Resource |
---|---|
https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes | Release Notes Vendor Advisory |
https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory | Vendor Advisory |
https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes | Release Notes Vendor Advisory |
https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-02-09 20:15
Updated : 2024-11-21 08:50
NVD link : CVE-2024-1246
Mitre link : CVE-2024-1246
CVE.ORG link : CVE-2024-1246
JSON object : View
Products Affected
concretecms
- concrete_cms