First published: Wed Apr 03 2024(Updated: )
Concrete CMS version 9 prior to 9.2.8 and previous versions prior to 8.5.16 are vulnerable to Stored XSS in the Search Field. Prior to the fix, stored XSS could be executed by an administrator changing a filter to which a rogue administrator had previously added malicious code. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Thanks Alexey Solovyev for reporting
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | <8.5.16 | 8.5.16 |
composer/concrete5/concrete5 | >=9.0.0RC1<9.2.8 | 9.2.8 |
Concrete5 | <8.5.16 | |
Concrete5 | >=9.0.0<9.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3181 is classified as a medium severity Stored XSS vulnerability.
To resolve CVE-2024-3181, upgrade your Concrete CMS to version 9.2.8 or 8.5.16 or later.
CVE-2024-3181 affects administrators using Concrete CMS versions prior to 9.2.8 and 8.5.16.
The impact of CVE-2024-3181 allows an attacker to execute malicious scripts in the context of an affected user's session.
CVE-2024-3181 was reported in early 2024 as a vulnerability in Concrete CMS.