Impact
Concrete CMS versions 9.5.0 and earlier allow an unauthenticated attacker to send a GET request to /ccm/system/dialogs/file/usage/{fID} with any integer file ID. The response returns sensitive internal site structure data, including page identifiers, versions, and URL paths, exposing information that could aid further attacks. The vulnerability is an Insecure Direct Object Reference (IDOR).
Affected Systems
Concrete CMS, any installation running version 9.5.0 or lower is affected. The attack exploits the missing authentication gate in the /ccm/system/dialogs/file/usage/ endpoint.
Risk and Exploitability
The CVSS v4.0 score of 6.3 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Since authentication is not required, any user with network access to the site can exploit this IDOR to retrieve internal site structure data over the network. The attack surface is broad and can lead to enumeration of the site’s contents, potentially exposing further weaknesses.
OpenCVE Enrichment