First published: Wed Apr 03 2024(Updated: )
Concrete CMS version 9 before 9.2.8 and previous versions before 8.5.16 are vulnerable to Stored XSS in the Custom Class page editing. Prior to the fix, a rogue administrator could insert malicious code in the custom class field due to insufficient validation of administrator provided data. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Thanks Alexey Solovyev for reporting.
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | <8.5.16 | 8.5.16 |
composer/concrete5/concrete5 | >=9.0.0RC1<9.2.8 | 9.2.8 |
Concrete5 | <8.5.16 | |
Concrete5 | >=9.0.0<9.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3179 has a severity rating that identifies it as a significant risk due to the potential for Stored XSS attacks.
To mitigate CVE-2024-3179, upgrade to Concrete CMS version 9.2.8 or 8.5.16 or later.
CVE-2024-3179 affects Concrete CMS versions prior to 9.2.8 and 8.5.16.
CVE-2024-3179 enables attackers to execute Stored XSS attacks through the Custom Class page editing feature.
Yes, CVE-2024-3179 arises from insufficient validation of input provided by administrators in the custom class field.