First published: Mon Dec 25 2023(Updated: )
Concrete CMS before 8.5.14 and 9 before 9.2.3 allows Cross Site Request Forgery (CSRF) via ccm/calendar/dialogs/event/delete/submit. An attacker can force an admin to delete events on the site because the event ID is numeric and sequential.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | >=9.0.0<9.2.3 | 9.2.3 |
composer/concrete5/concrete5 | <8.5.14 | 8.5.14 |
Concrete5 | <8.5.14 | |
Concrete5 | >=9.0.0<9.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48653 is classified as a medium severity vulnerability due to its potential for exploitation via Cross Site Request Forgery.
To fix CVE-2023-48653, upgrade to Concrete CMS versions 8.5.14 or 9.2.3 or higher.
CVE-2023-48653 allows attackers to perform Cross Site Request Forgery attacks, potentially forcing an admin to delete site events.
Concrete CMS versions prior to 8.5.14 and 9 versions before 9.2.3 are affected by CVE-2023-48653.
There are no official workarounds for CVE-2023-48653; upgrading to the patched versions is recommended.