CVE-2024-2179

Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Name field which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.2 with a vector of AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N Concrete versions below 9 do not include group types so they are not affected by this vulnerability. Thanks Luca Fuda for reporting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*

History

16 Dec 2024, 19:01

Type Values Removed Values Added
References () https://documentation.concretecms.org/9-x/developers/introduction/version-history/927-release-notesĀ - () https://documentation.concretecms.org/9-x/developers/introduction/version-history/927-release-notesĀ - Release Notes
First Time Concretecms
Concretecms concrete Cms
CPE cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*

Information

Published : 2024-03-05 21:15

Updated : 2024-12-16 19:01


NVD link : CVE-2024-2179

Mitre link : CVE-2024-2179

CVE.ORG link : CVE-2024-2179


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')