Vulnerability Description
Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Concretecms | Concrete Cms | < 8.5.18 |
Related Weaknesses (CWE)
References
- https://documentation.concretecms.org/9-x/developers/introduction/version-historRelease NotesVendor Advisory
- https://documentation.concretecms.org/developers/introduction/version-history/85Release NotesVendor Advisory
- https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bcPatch
- https://github.com/concretecms/concretecms/pull/12166Patch
FAQ
What is CVE-2024-4350?
CVE-2024-4350 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject mali...
How severe is CVE-2024-4350?
CVE-2024-4350 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4350?
Check the references section above for vendor advisories and patch information. Affected products include: Concretecms Concrete Cms.