Description
Concrete CMS 9.5.0 and below is vulnerable to IDOR. The '/ccm/frontend/conversations/message_page' endpoint returns the full content of any conversation message. An unauthenticated attacker can enumerate all conversation messages, including messages from restricted pages, member-only areas, and the moderation queue. File attachments with download URLs are also exposed. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 6.3 with Vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks Tristan Madani for reporting.
Published: 2026-05-21
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Concrete CMS versions 9.5.0 and earlier expose an improper authorization flaw that lets anyone query the /ccm/frontend/conversations/message_page endpoint and retrieve the full content of any conversation message. The flaw allows an unauthenticated attacker to read highly sensitive information, including messages from restricted pages, member‑only areas, and the moderation queue, as well as download URLs for attached files. The weakness is an IDOR (CWE‑862) that compromises confidentiality and data integrity.

Affected Systems

The vulnerability affects all installations of Concrete CMS released in version 9.5.0 and earlier. The affected product is the Concrete CMS content management system. No specific patch level is listed, so any system running those versions is at risk.

Risk and Exploitability

The CVSS score of 6.3 characterizes the issue as medium severity, and the EPSS score is not available. The vulnerability is not included in the CISA KEV list. An attacker can exploit the flaw by making unauthenticated HTTP requests to the vulnerable endpoint, enumerating message identifiers, and retrieving message bodies or attachment URLs. Because no authentication is required, the attack can be automated and performed remotely, making it a practical threat in environments where the CMS is publicly exposed.

Generated by OpenCVE AI on May 21, 2026 at 22:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to the latest version that includes the IDOR fix (e.g., 9.5.1 or later).
  • Ensure that the /ccm/frontend/conversations/message_page route is protected by authentication or access controls if upgrading is delayed.
  • Remove or restrict direct download links for file attachments or move them to a protected storage area.

Generated by OpenCVE AI on May 21, 2026 at 22:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Concrete CMS 9.5.0 and below is vulnerable to IDOR. The '/ccm/frontend/conversations/message_page' endpoint returns the full content of any conversation message. An unauthenticated attacker can enumerate all conversation messages, including messages from restricted pages, member-only areas, and the moderation queue. File attachments with download URLs are also exposed. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 6.3 with Vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks Tristan Madani for reporting.
Title Concrete CMS 9.5.0 and below is vulnerable to IDOR in '/ccm/frontend/conversations/message_page' allowing unauthenticated read of any conversation message
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-21T21:04:50.691Z

Reserved: 2026-05-09T15:48:41.906Z

Link: CVE-2026-8238

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:49.893

Modified: 2026-05-21T22:16:49.893

Link: CVE-2026-8238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T22:30:20Z

Weaknesses