In Concrete CMS below version 9.4.8, A stored cross-site scripting (XSS) vulnerability exists in the search block where page names and content are rendered without proper HTML encoding in search results. This allows authenticated, rogue administrators to inject malicious JavaScript through page names that executes when users search for and view those pages in search results. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks zolpak for reporting
References
| Link | Resource |
|---|---|
| https://documentation.concretecms.org/9-x/developers/introduction/version-history/948-release-notes | Release Notes Patch Vendor Advisory |
| https://github.com/concretecms/concretecms/pull/12826 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-04 02:15
Updated : 2026-03-04 21:37
NVD link : CVE-2026-3244
Mitre link : CVE-2026-3244
CVE.ORG link : CVE-2026-3244
JSON object : View
Products Affected
concretecms
- concrete_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
