VYPR
Low severityNVD Advisory· Published Aug 9, 2024· Updated Jan 17, 2025

Concrete CMS Stored XSS in Board instances

CVE-2024-7512

Description

Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.6 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting. (CNA updated AC score to L based on CVSS 4.0 documentation)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9.0.0 through 9.3.2 are vulnerable to stored XSS in Board instances, exploitable by a rogue administrator with high privileges and user interaction.

Vulnerability

Overview

Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored cross-site scripting (XSS) vulnerability within Board instances [1][2]. The root cause is insufficient sanitization of input data processed by Board components, allowing an authenticated administrator with high privileges to inject arbitrary malicious code that is then stored and executed in the context of other users' browsers [2].

Attack

Vector and Exploitation

Exploitation of this vulnerability requires an attacker to possess administrative privileges on a Concrete CMS installation and to have access to the Board editor functionality [1][2]. The attack is network-based, with low attack complexity, and requires user interaction from a victim to trigger the stored payload [2]. A rogue administrator can inject malicious script into a Board instance, which subsequently executes when an authenticated victim views the affected Board page.

Impact

A successful attack could lead to limited confidentiality impact, as the CVSS vector indicates VC:L (no impact on integrity or availability) [2]. The vulnerability does not allow for privilege escalation, but it could enable an attacker to perform actions on behalf of a victim within their session, potentially accessing sensitive information or performing unauthorized actions within the application scope.

Mitigation

Status

The vulnerability is patched in Concrete CMS version 9.3.3, released on the same day as the advisory [1]. The latest release notes explicitly mention several bug fixes and security improvements, including better output sanitization in the Top Navigation Bar block, though the Board XSS fix is not individually itemized [1]. Users should upgrade to version 9.3.3 or later to remediate this issue. Versions below 9.0.0 are not affected [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
concrete5/concrete5Packagist
>= 9.0.0RC1, < 9.3.39.3.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.