First published: Mon Sep 16 2024(Updated: )
Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.18 are vulnerable to Stored XSS in the "Next&Previous Nav" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Since the "Next&Previous Nav" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users. Thanks, Chu Quoc Khanh for reporting.
Credit: ff5b8ace-8b95-4078-9743-eac1ca5451de ff5b8ace-8b95-4078-9743-eac1ca5451de
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | >=9.0.0<9.3.4 | 9.3.4 |
composer/concrete5/concrete5 | <8.5.19 | 8.5.19 |
Concrete5 | <8.5.19 | |
Concrete5 | >=9.0<9.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8661 has a high severity due to its potential for stored XSS attacks.
CVE-2024-8661 affects Concrete CMS versions 9.0.0 to 9.3.3 and below version 8.5.18.
To fix CVE-2024-8661, upgrade to Concrete CMS version 9.3.4 or 8.5.19.
CVE-2024-8661 is classified as a stored cross-site scripting (XSS) vulnerability.
A rogue administrator can exploit CVE-2024-8661 by injecting a malicious payload.