First published: Mon Nov 14 2022(Updated: )
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XXE based DNS requests leading to IP disclosure.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concretecms Concrete Cms | <8.5.10 | |
Concretecms Concrete Cms | >=9.0.0<=9.1.2 | |
<8.5.10 | ||
>=9.0.0<=9.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43689 is a vulnerability in Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 that allows XXE based DNS requests leading to IP disclosure.
CVE-2022-43689 has a severity rating of 5.3 (medium).
Concrete CMS versions below 8.5.10 and between 9.0.0 and 9.1.2 are affected by CVE-2022-43689.
To fix CVE-2022-43689, update Concrete CMS to version 8.5.10 or higher or upgrade to a version between 9.1.2 and 9.1.3.
You can find more information about CVE-2022-43689 in the release notes and documentation of Concrete CMS.