VYPR
Moderate severityNVD Advisory· Published Mar 4, 2026· Updated Mar 4, 2026

Concrete CMS below version 9.4.8 is vulnerable to Stored XSS in Search Results via Page Names

CVE-2026-3244

Description

In Concrete CMS below version 9.4.8, A stored cross-site scripting (XSS) vulnerability exists in the search block where page names and content are rendered without proper HTML encoding in search results. This allows authenticated, rogue administrators to inject malicious JavaScript through page names that executes when users search for and view those pages in search results. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks zolpak for reporting

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Concrete CMS ≤9.4.7 search block allows authenticated administrators to inject JavaScript via page names.

Vulnerability

CVE-2026-3244 is a stored cross-site scripting (XSS) vulnerability in Concrete CMS versions below 9.4.8. The vulnerability exists in the search block, where page names and content are rendered without proper HTML encoding in search results [1][2]. This allows an authenticated administrator with rogue privileges to inject malicious JavaScript through page names that later executes when other users search for and view those pages in search results [2].

Exploitation

To exploit this vulnerability, an attacker must have administrative access to Concrete CMS and the ability to create or modify page names. The attack is network-based (AV:N), requires low attack complexity (AC:L), and no advanced attack prerequisites (AT:N). User interaction is required (UI:P): a victim must perform a search and view the results containing the crafted page name [1]. The vulnerability is stored in the database and triggers in the victim's browser when the search results are rendered.

Impact

A successful exploit allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. The CVSS v4.0 score is 4.8 (medium), with the vector indicating no impact to confidentiality or availability, but a low impact to integrity (VI:L) [1][2]. The scope is unchanged (SC:N, SI:N, SA:N), meaning the injected script executes within the application's security context.

Mitigation

The vulnerability is fixed in Concrete CMS version 9.4.8, released with commit 12826 [2]. Users are strongly encouraged to upgrade to the latest version to prevent exploitation. No workarounds are documented for this specific issue.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
concrete5/concrete5Packagist
< 9.4.89.4.8

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.