Description
Concrete CMS 9.5.0 and below is vulnerable to Reflected XSS in Legacy Pagination via HTML attribute injection. Concrete\Core\Legacy\Pagination builds pagination links by raw-interpolating its $URL field into href="" (<a href="{$linkURL}" …>). Any authenticated admin or report viewer with access to `/dashboard/reports/forms/legacy` who clicks the crafted URL fires the payload in their session. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 6.0 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting
Published: 2026-05-21
Score: 6 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Concrete CMS versions 9.5.0 and earlier are affected by a reflected cross‑site scripting vulnerability that occurs when the Legacy Pagination component inserts a raw URL into an href attribute of an <a> tag. A crafted link containing malicious JavaScript can be forged and delivered to any authenticated administrator or report viewer who accesses the /dashboard/reports/forms/legacy page; when the user follows the link, the payload executes within the victim’s session, allowing the attacker to steal credentials, deface content, or perform further actions under the victim’s authority. The vulnerability is a direct result of insufficient output sanitization of the URL parameter.

Affected Systems

The affected product is Concrete CMS (Concrete CMS) running any release version 9.5.0 or earlier. The flaw is exploitable by users who have administrative or report‑viewer privileges and can navigate to the legacy reports page /dashboard/reports/forms/legacy. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 6.0 indicates a moderate risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation at the time of this analysis. An attacker would need to craft a malicious link and deliver it to an authenticated user who is inclined to click it, which could be achieved through phishing or compromised credential reuse. While the attack requires user interaction and a valid user session, the impact of successful exploitation could be significant for the affected organization because it executes in the privileges of an administrator or report viewer.

Generated by OpenCVE AI on May 21, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to the latest version that contains the pagination payload sanitization fix (e.g., 9.5.1 or later).
  • If an upgrade is not immediately possible, restrict access to /dashboard/reports/forms/legacy so that only users with a legitimate reporting need can reach the page, thereby reducing the attack surface.
  • Apply input sanitization to the href attribute in the Legacy Pagination component manually, ensuring that all URLs are properly escaped or validated to prevent attribute injection.

Generated by OpenCVE AI on May 21, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Concrete CMS 9.5.0 and below is vulnerable to Reflected XSS in Legacy Pagination via HTML attribute injection. Concrete\Core\Legacy\Pagination builds pagination links by raw-interpolating its $URL field into href="" (<a href="{$linkURL}" …>). Any authenticated admin or report viewer with access to `/dashboard/reports/forms/legacy` who clicks the crafted URL fires the payload in their session. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 6.0 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting
Title Concrete CMS 9.5.0 and below is vulnerable to Reflected XSS in Legacy Pagination via HTML attribute injection
Weaknesses CWE-83
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-21T21:14:18.940Z

Reserved: 2026-05-09T16:38:53.682Z

Link: CVE-2026-8245

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:50.243

Modified: 2026-05-21T22:16:50.243

Link: CVE-2026-8245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T22:30:20Z

Weaknesses