First published: Tue Mar 05 2024(Updated: )
Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Name field which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.2 with a vector of AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N Concrete versions below 9 do not include group types so they are not affected by this vulnerability. Thanks Luca Fuda for reporting.
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | <9.2.7 | 9.2.7 |
Concrete5 | >=9.0.0<9.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2179 has a high severity due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-2179, upgrade Concrete CMS to version 9.2.7 or later.
CVE-2024-2179 can facilitate stored XSS attacks that execute when the malicious code is rendered in the browser.
Administrators using Concrete CMS versions prior to 9.2.7 are affected by CVE-2024-2179.
The vulnerable component in CVE-2024-2179 is the Name field of a Group type in Concrete CMS.