Impact
The vulnerability arises because the core CMS update controller in Concrete CMS 9.5.0 and earlier does not validate the CSRF token that is emitted for the update form. When a user with upgrade privileges submits the form, the POST request includes a token that the controller ignores, allowing an attacker to forge a request from the victim’s browser. The forged request can instruct the CMS to perform an update to an attacker-selected version string.
Affected Systems
Concrete CMS versions 9.5.0 through the most recent release prior to the fix are affected. Any installation running those versions that has a valid update package available under DIR_CORE_UPDATES is vulnerable. The issue applies only to sites that expose the dashboard update page and allow the canUpgrade() check to pass.
Risk and Exploitability
This flaw is rated CVSS 7.5 (High), giving an attacker the ability to acquire code execution on the host with no credentials, provided they can trick a user into visiting a malicious site to trigger the CSRF. The EPSS score is not published, and the vulnerability is not listed in the CISA KEV. The attack vector is remote via the public web interface, and the exploitation requires only that the victim’s browser be able to submit the upgrade form.
OpenCVE Enrichment