Description
Concrete CMS 9.5.0 and below is vulnerable to unauthorized file deletion due to an Inverted CSRF token check in the DeleteFile controller. The code throws an error when the token IS valid and proceeds with file deletion when the token is invalid or missing. This effectively disables CSRF protection for the file deletion endpoint, allowing cross-site request forgery attacks against users who have permission to edit conversation messages. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with a vector of CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Tristan Mandani for reporting.
Published: 2026-05-21
Score: 2.3 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises because the DeleteFile controller incorrectly validates CSRF tokens, deleting files when a token is missing or invalid and proceeding otherwise. This effectively bypasses CSRF protection, allowing an attacker to trick a privileged user into deleting arbitrary files. The weakness is a Cross‑Site Request Forgery flaw (CWE‑352) and results in loss of data integrity for content managed within Concrete CMS.

Affected Systems

Concrete CMS version 9.5.0 and below are affected. Any instance of Concrete CMS that has not upgraded past 9.5.0 is vulnerable, and users with permission to edit conversation messages could have files removed by an attacker.

Risk and Exploitability

The CVSS v4 score of 2.3 indicates low severity, and no EPSS score is available, suggesting no widespread exploitation. The vulnerability is not listed in CISA KEV. The most likely attack vector is a CSRF request performed by a malicious site or link that exploits an authenticated user’s session. If the user has deletion rights, the attacker could delete any file accessible to that user, potentially impacting critical assets.

Generated by OpenCVE AI on May 21, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to the latest release that includes the CSRF fix (e.g., 9.5.1 or later).
  • If upgrading immediately is not possible, restrict file deletion capabilities by removing access to the DeleteFile controller or limiting permission to trusted administrators only.
  • Require an additional confirmation step or two‑factor approval before allowing file deletions for users with edit permissions on conversation messages.

Generated by OpenCVE AI on May 21, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Concrete CMS 9.5.0 and below is vulnerable to unauthorized file deletion due to an Inverted CSRF token check in the DeleteFile controller. The code throws an error when the token IS valid and proceeds with file deletion when the token is invalid or missing. This effectively disables CSRF protection for the file deletion endpoint, allowing cross-site request forgery attacks against users who have permission to edit conversation messages. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with a vector of CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Tristan Mandani for reporting.
Title Concrete CMS 9.5.0 and below is vulnerable to CSRF via the DeleteFile controller
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-21T21:17:22.069Z

Reserved: 2026-05-05T18:43:46.788Z

Link: CVE-2026-7882

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:49.020

Modified: 2026-05-21T22:16:49.020

Link: CVE-2026-7882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T23:00:12Z

Weaknesses