First published: Wed Apr 03 2024(Updated: )
Concrete CMS version 9 before 9.2.8 and previous versions prior to 8.5.16 is vulnerable to Stored XSS on the calendar color settings screen since Information input by the user is output without escaping. A rogue administrator could inject malicious javascript into the Calendar Color Settings screen which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.0 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N&version=3.1 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator Thank you Rikuto Tauchi for reporting
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | <8.5.16 | 8.5.16 |
composer/concrete5/concrete5 | >=9.0.0RC1<9.2.8 | 9.2.8 |
Concrete5 | <8.5.16 | |
Concrete5 | >=9.0.0<9.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2753 is rated as a high-severity vulnerability due to the potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-2753, upgrade Concrete CMS to version 9.2.8 or 8.5.16 or later.
CVE-2024-2753 affects all versions of Concrete CMS prior to 9.2.8 and 8.5.16.
CVE-2024-2753 allows an attacker to inject malicious JavaScript into the calendar color settings, leading to stored XSS.
Yes, CVE-2024-2753 is a remote vulnerability that can be exploited by a rogue administrator.