Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Name field which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.2 with a vector of AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N Concrete versions below 9 do not include group types so they are not affected by this vulnerability. Thanks Luca Fuda for reporting.
References
Configurations
History
16 Dec 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://documentation.concretecms.org/9-x/developers/introduction/version-history/927-release-notesĀ - Release Notes | |
First Time |
Concretecms
Concretecms concrete Cms |
|
CPE | cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:* |
Information
Published : 2024-03-05 21:15
Updated : 2024-12-16 19:01
NVD link : CVE-2024-2179
Mitre link : CVE-2024-2179
CVE.ORG link : CVE-2024-2179
JSON object : View
Products Affected
concretecms
- concrete_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')