Description
In Concrete CMS below version 9.4.8, a user with permission to edit a page with element Legacy form can perform a stored XSS attack towards high-privilege accounts via the Question field. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Thanks minhnn42, namdi and quanlna2 from VCSLab-Viettel Cyber Security for reporting.
Published: 2026-03-04
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

Concrete CMS versions older than 9.4.8 permit a user who can edit a page that includes the Legacy form element to store malicious script payloads in the Question field. When a high‑privilege user later views that page, the stored script executes in the user’s browser context, potentially allowing the attacker to capture credentials, hijack sessions, or perform other browser‑based abuses. The vulnerability is a classic input validation flaw classified as CWE‑79. The impact is therefore a stored cross‑site scripting exposure that can affect the confidentiality and integrity of privileged accounts.

Affected Systems

All installations of Concrete CMS, version 9.4.8 and earlier, that use the Legacy form element on a page edit‑able by users, are affected. Any deployment where high‑privilege users can view pages containing this legacy form is at risk unless the CMS is upgraded beyond the affected version.

Risk and Exploitability

The CVE carries a CVSS v4.0 score of 4.8, indicating moderate severity. The EPSS score is reported as less than 1%, suggesting low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires only normal edit permissions on a page containing the Legacy form; after injection the payload is served to all users who view the page, particularly high‑privilege accounts. The likely attack vector is through the Question field of the Legacy form, inferred from the description because the supplied data does not explicitly state the entry point but the text indicates it lies there.

Generated by OpenCVE AI on April 17, 2026 at 13:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to version 9.4.8 or later
  • Remove or disable the Legacy form element from pages that are viewed by high‑privilege accounts
  • Restrict edit permissions on pages that contain Legacy form elements to the minimum required users

Generated by OpenCVE AI on April 17, 2026 at 13:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-45fj-fvmm-xcc5 Concrete CMS has a stored Cross-site Scripting (XSS) vulnerability
History

Wed, 04 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Wed, 04 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description In Concrete CMS below version 9.4.8, a user with permission to edit a page with element Legacy form can perform a stored XSS attack towards high-privilege accounts via the Question field. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Thanks minhnn42, namdi and quanlna2 from VCSLab-Viettel Cyber Security for reporting.
Title Concrete CMS below 9.4.8 is vulnerable to Stored XSS via Legacy form
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-03-04T15:33:21.842Z

Reserved: 2026-02-26T01:42:11.496Z

Link: CVE-2026-3240

cve-icon Vulnrichment

Updated: 2026-03-04T15:32:50.021Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T03:16:04.940

Modified: 2026-03-04T21:32:44.683

Link: CVE-2026-3240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:30:19Z

Weaknesses