Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in the "Next&Previous Nav" block. A rogue administrator could add a malicious payload  by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector  CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N  Since the "Next&Previous Nav" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users. Thanks, Chu Quoc Khanh for reporting.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    16 Dec 2024, 19:08
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Concretecms Concretecms concrete Cms | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.8 | 
| CPE | cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:* | |
| References | () https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes - Release Notes | |
| References | () https://documentation.concretecms.org/developers/introduction/version-history/8519-release-notes - Release Notes | |
| References | () https://github.com/concretecms/concretecms/commit/ce5ee2ab83fe8de6fa012dd51c5a1dde05cb0dc4 - Patch | |
| References | () https://github.com/concretecms/concretecms/pull/12204 - Patch | 
Information
                Published : 2024-09-16 18:15
Updated : 2024-12-16 19:08
NVD link : CVE-2024-8661
Mitre link : CVE-2024-8661
CVE.ORG link : CVE-2024-8661
JSON object : View
Products Affected
                concretecms
- concrete_cms
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
