Concrete CMS vulnerable to stored XSS via the Role Name field
Low severity
GitHub Reviewed
Published
Feb 9, 2024
to the GitHub Advisory Database
•
Updated Feb 15, 2024
Package
Affected versions
>= 9.0.0RC1, < 9.2.5
Patched versions
9.2.5
Description
Published by the National Vulnerability Database
Feb 9, 2024
Published to the GitHub Advisory Database
Feb 9, 2024
Reviewed
Feb 9, 2024
Last updated
Feb 15, 2024
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability.
References