Skip to content

Concrete CMS Stored Cross-site Scripting vulnerability

Low severity GitHub Reviewed Published Mar 5, 2024 to the GitHub Advisory Database • Updated Mar 6, 2024

Package

composer concrete5/concrete5 (Composer)

Affected versions

< 9.2.7

Patched versions

9.2.7

Description

Concrete CMS version 9 before 9.2.7 is vulnerable to Stored XSS via the Name field of a Group type since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Name field which might be executed when users visit the affected page. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 2.2 with a vector of AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N Concrete versions below 9 do not include group types so they are not affected by this vulnerability. Thanks Luca Fuda for reporting.

References

Published by the National Vulnerability Database Mar 5, 2024
Published to the GitHub Advisory Database Mar 5, 2024
Last updated Mar 6, 2024
Reviewed Mar 6, 2024

Severity

Low
2.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2024-2179

GHSA ID

GHSA-4m7h-34xm-4wjv
Checking history
See something to contribute? Suggest improvements for this vulnerability.