Concrete CMS Stored XSS in Board instances
Description
Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.6 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting. (CNA updated AC score to L based on CVSS 4.0 documentation)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Concrete CMS 9.0.0 through 9.3.2 are vulnerable to stored XSS in Board instances, exploitable by a rogue administrator with high privileges and user interaction.
Vulnerability
Overview
Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored cross-site scripting (XSS) vulnerability within Board instances [1][2]. The root cause is insufficient sanitization of input data processed by Board components, allowing an authenticated administrator with high privileges to inject arbitrary malicious code that is then stored and executed in the context of other users' browsers [2].
Attack
Vector and Exploitation
Exploitation of this vulnerability requires an attacker to possess administrative privileges on a Concrete CMS installation and to have access to the Board editor functionality [1][2]. The attack is network-based, with low attack complexity, and requires user interaction from a victim to trigger the stored payload [2]. A rogue administrator can inject malicious script into a Board instance, which subsequently executes when an authenticated victim views the affected Board page.
Impact
A successful attack could lead to limited confidentiality impact, as the CVSS vector indicates VC:L (no impact on integrity or availability) [2]. The vulnerability does not allow for privilege escalation, but it could enable an attacker to perform actions on behalf of a victim within their session, potentially accessing sensitive information or performing unauthorized actions within the application scope.
Mitigation
Status
The vulnerability is patched in Concrete CMS version 9.3.3, released on the same day as the advisory [1]. The latest release notes explicitly mention several bug fixes and security improvements, including better output sanitization in the Top Navigation Bar block, though the Board XSS fix is not individually itemized [1]. Users should upgrade to version 9.3.3 or later to remediate this issue. Versions below 9.0.0 are not affected [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
concrete5/concrete5Packagist | >= 9.0.0RC1, < 9.3.3 | 9.3.3 |
Affected products
2- Concrete CMS/Concrete CMSv5Range: 9.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.