Description
Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescan(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.
Published: 2026-05-21
Score: 2.3 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Concrete CMS 9 before 9.5.0 allows attackers to trigger the backend file rescan operation via a crafted request, enabling unauthorized file scanning without authentication. The weakness is a classic Cross‑Site Request Forgery (CWE‑352) coupled with a lack of proper object‑level authorization (CWE‑1275). Although the CVSS score is 2.3, indicating a low severity, the impact is that users who inadvertently perform the action may cause the web application to rescan files, potentially leading to resource exhaustion or unintended exposure of file metadata. The vulnerability does not grant direct code execution or data exfiltration but can be leveraged to disrupt normal system operations.

Affected Systems

Concrete CMS users running any version of Concrete CMS 9 prior to the 9.5.0 release are affected. This includes all stable 9.x releases that have not been patched to 9.5.0 or later. The affected product is the Concrete CMS web content management system, specifically the backend file rescanning functionality exposed through concrete/controllers/backend/file rescan().

Risk and Exploitability

The canonical CVSS vector indicates that no special privileges are required, the attack requires user interaction, and the theoretical impact covers only a limited set of actions. Without a valid session, the attacker's ability to trigger the rescan is constrained, and the EPSS score is currently unavailable, so there is no evidence of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Therefore, while exploitation is unlikely at scale, the risk remains if compromised users or accounts are abused, potentially allowing attackers to disrupt file management workflows. The most likely attack path involves an authenticated user unknowingly visiting a malicious URL that forces the rescan, triggering the exploit with minimal effort.

Generated by OpenCVE AI on May 21, 2026 at 22:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Concrete CMS to version 9.5.0 or newer, where the CSRF protection has been corrected.
  • If an immediate upgrade is not feasible, restrict access to the file rescan endpoint by applying CSRF token validation or disabling the function for unauthenticated users via configuration settings.
  • Monitor access logs for unexpected file rescan requests and alert administrators to potential unauthorized activity.

Generated by OpenCVE AI on May 21, 2026 at 22:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Concretecms
Concretecms concrete Cms
Vendors & Products Concretecms
Concretecms concrete Cms

Thu, 21 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescan(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.
Title Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescan()
Weaknesses CWE-1275
CWE-352
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Concretecms Concrete Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: ConcreteCMS

Published:

Updated: 2026-05-21T21:25:17.585Z

Reserved: 2026-05-12T18:18:50.093Z

Link: CVE-2026-8433

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-21T22:16:51.813

Modified: 2026-05-21T22:16:51.813

Link: CVE-2026-8433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T22:45:20Z

Weaknesses