First published: Thu Aug 08 2024(Updated: )
Concrete CMS versions 9 through 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in getAttributeSetName(). A rogue administrator could inject malicious code.
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | >=9.0.0<9.3.3 | 9.3.3 |
composer/concrete5/concrete5 | <8.5.18 | 8.5.18 |
Concrete5 | <8.5.18 | |
Concrete5 | >=9.0.0<9.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7394 has a severity rating that indicates it poses a risk of Stored XSS vulnerabilities, allowing malicious code injection.
To fix CVE-2024-7394, upgrade to Concrete CMS versions 9.3.3 or 8.5.18 or later.
CVE-2024-7394 affects Concrete CMS versions 9 through 9.3.2 and below 8.5.18.
CVE-2024-7394 allows a rogue administrator to execute Stored XSS attacks, injecting malicious scripts into the application.
CVE-2024-7394 involves the getAttributeSetName() function within specified versions of Concrete CMS.