Vulnerability Description
Concrete CMS versions 9 below 9.2.8 and versions below 8.5.16 are vulnerable to Cross-site Scripting (XSS) in the Advanced File Search Filter. Prior to the fix, a rogue administrator could add malicious code in the file manager because of insufficient validation of administrator provided data. All administrators have access to the File Manager and hence could create a search filter with the malicious code attached. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Concretecms | Concrete Cms | < 8.5.16 |
Related Weaknesses (CWE)
References
- https://documentation.concretecms.org/9-x/developers/introduction/version-historRelease Notes
- https://documentation.concretecms.org/developers/introduction/version-history/85Release Notes
- https://documentation.concretecms.org/9-x/developers/introduction/version-historRelease Notes
- https://documentation.concretecms.org/developers/introduction/version-history/85Release Notes
FAQ
What is CVE-2024-3178?
CVE-2024-3178 is a vulnerability with a CVSS score of 3.1 (LOW). Concrete CMS versions 9 below 9.2.8 and versions below 8.5.16 are vulnerable to Cross-site Scripting (XSS) in the Advanced File Search Filter. Prior to the fix, a rogue administrator could add malicio...
How severe is CVE-2024-3178?
CVE-2024-3178 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3178?
Check the references section above for vendor advisories and patch information. Affected products include: Concretecms Concrete Cms.