Concrete CMS version 9 before 9.2.5 is vulnerable to  stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0690 Concrete CMS version 9 before 9.2.5 is vulnerable to  stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability.
Github GHSA Github GHSA GHSA-q25h-jch8-gfrp Concrete CMS vulnerable to stored XSS via the Role Name field
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2024-08-01T18:33:25.343Z

Reserved: 2024-02-06T00:51:01.240Z

Link: CVE-2024-1247

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.343Z

cve-icon NVD

Status : Modified

Published: 2024-02-09T19:15:24.183

Modified: 2024-11-21T08:50:09.013

Link: CVE-2024-1247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.