First published: Tue Oct 10 2023(Updated: )
Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concretecms Concrete Cms | =9.2.1 | |
composer/concrete5/concrete5 | <=9.2.1 | |
=9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-44763.
The severity of CVE-2023-44763 is medium with a CVSS score of 5.4.
The affected software is Concrete CMS version 9.2.1.
CVE-2023-44763 allows arbitrary file uploads via the Thumbnail file upload, which can lead to Cross-Site Scripting (XSS) attacks.
At the time of writing, there is no known fix or patch available for CVE-2023-44763. It is recommended to follow security best practices and monitor for updates from the software vendor.