Description
Concrete CMS 9.5.0 and below fails to sanitize path traversal sequences in the ptComposerFormLayoutSetControlCustomTemplate field when saving page type composer form layouts. An authenticated rogue administrator with composer form editing rights can exploit this to include arbitrary readable files on the server. Combined with the file uploader's extension-only validation (which permits PHP code in files saved with image extensions like .png), this can result in authenticated remote code execution. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 9.4 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H   Thanks Yonatan Drori (Tenzai) for reporting.
Published: 2026-05-21
Score: 9.4 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Concrete CMS versions 9.5.0 and earlier contain a flaw that allows an authenticated user with composer form editing rights to introduce path traversal sequences when saving a composer form layout. The vulnerable field permits inclusion of arbitrary readable files on the server and, when combined with the file uploader’s extension‑only validation that allows PHP code in files saved with image extensions, this can lead to remote code execution. This is a high‑severity vulnerability identified as CWE‑23, CWE‑434 and CWE‑98, exposing confidentiality, integrity and availability at the system level for attackers who can obtain administrative credentials or appropriate composer form permissions.

Affected Systems

The affected product is Concrete CMS, specifically all releases up to and including 9.5.0. Any deployment of Concrete CMS 9.5.0 or earlier is vulnerable; newer releases are presumed fixed.

Risk and Exploitability

The CVSS v4.0 score of 9.4 indicates a critical level of risk. Exploitation requires authenticated access with composer form editing rights, so an attacker who compromises or masquerades as an administrator can trigger the exploit. The EPSS score is not available, but the high CVSS and the lack of mitigation in the vulnerable code suggest a significant risk if vulnerable systems are not patched. The vulnerability is not listed in the CISA KEV catalog. The attack vector is local to the system through the web interface, and the availability of the web application provides the necessary path for exploitation.

Generated by OpenCVE AI on May 21, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to a version newer than 9.5.0 where the path traversal and file inclusion handling has been corrected.
  • Revoke or restrict composer form editing rights to trusted administrators until a patch can be applied; limit the scope of users who can modify form templates.
  • Configure the file upload component to reject PHP code in files with image extensions, enforce strict MIME type checks, and prevent execution of uploaded files by moving them out of the web‑root or setting appropriate handler restrictions.

Generated by OpenCVE AI on May 21, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description Concrete CMS 9.5.0 and below fails to sanitize path traversal sequences in the ptComposerFormLayoutSetControlCustomTemplate field when saving page type composer form layouts. An authenticated rogue administrator with composer form editing rights can exploit this to include arbitrary readable files on the server. Combined with the file uploader's extension-only validation (which permits PHP code in files saved with image extensions like .png), this can result in authenticated remote code execution. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 9.4 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H   Thanks Yonatan Drori (Tenzai) for reporting.
Title Concrete CMS 9.5.0 and below is vulnerable to Authenticated RCE via Composer customTemplate Path Traversal leading to PHP File Inclusion
Weaknesses CWE-23
CWE-434
CWE-98
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-21T20:13:31.343Z

Reserved: 2026-05-07T17:49:33.331Z

Link: CVE-2026-8134

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T21:16:32.837

Modified: 2026-05-21T21:16:32.837

Link: CVE-2026-8134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T21:30:19Z

Weaknesses