Description
In Concrete CMS 9.5.0 and below, the RSS Displayer block accepts a feed URL from any page editor and fetches it server-side without validation enabling redirect-to-internal bypasses.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.1 with a vector CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N.
Published: 2026-05-21
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In Concrete CMS 9.5.0 and earlier the RSS Displayer block accepts any feed URL supplied by a page editor and fetches it server‑side without validating redirects. This behaviour enables an attacker who can edit a page to trigger a redirect‑to‑internal request, effectively allowing the CMS to contact internal services that would otherwise be inaccessible. The flaw is a Server‑Side Request Forgery and falls under CWE‑918. Although the CVSS v4.0 score of 2.1 suggests a low severity impact, the attack can reveal internal network topology and provide a foothold for later exploitation.

Affected Systems

Concrete CMS sites running version 9.5.0 or earlier are affected. The risk applies to any user with page‑editing permissions who can add or modify an RSS Displayer block. Versions newer than 9.5.0 are not affected according to the current advisory. No vendor‑specific patches or work‑arounds are listed, but the security team has acknowledged the issue.

Risk and Exploitability

The attack requires the attacker to have the ability to edit a page and add an RSS block, which is typically restricted to content editors. Once an arbitrary URL is supplied, the CMS can be forced to access internal resources, potentially revealing sensitive information or enabling lateral movement. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the low CVSS indicates only a limited impact if left unpatched. Nevertheless, the ability to reach internal services is a non‑trivial risk and should be mitigated promptly.

Generated by OpenCVE AI on May 21, 2026 at 23:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to the latest release that removes the SSRF bug in the RSS Displayer block.
  • Disable or uninstall the RSS Displayer block on sites that do not need it, or restrict its use to administrators only.
  • Limit editor permissions so that only trusted users can add or configure RSS blocks, and consider enforcing URL validation or domain blocking in the CMS configuration.

Generated by OpenCVE AI on May 21, 2026 at 23:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description In Concrete CMS 9.5.0 and below, the RSS Displayer block accepts a feed URL from any page editor and fetches it server-side without validation enabling redirect-to-internal bypasses.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.1 with a vector CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N.
Title Concrete CMS 9.5.0 is vulnerable to SSRF via RSS Displayer Block
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-22T12:54:45.612Z

Reserved: 2026-05-05T20:53:35.093Z

Link: CVE-2026-7890

cve-icon Vulnrichment

Updated: 2026-05-22T12:54:41.747Z

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:49.400

Modified: 2026-05-21T22:16:49.400

Link: CVE-2026-7890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T23:30:22Z

Weaknesses