VYPR
High severityNVD Advisory· Published May 21, 2026

CVE-2026-8135

CVE-2026-8135

Description

Concrete CMS 9.5.0 and below is vulnerable to Remote Code Execution due to insecure deserialization occurring in the ExpressEntryList block controller. An rogue administrator with privileges to add blocks to an area can bypass the intended protection mechanism (_fromCIF === true), which normally restricts malicious inputs over form POST requests, by leveraging the REST API functionality. Because the REST API parses requests using json_decode(), the string "true" is evaluated as a strict PHP Boolean(true).  This bypass allows the attacker to inject a malicious serialized payload  into the block's filterFields database column. The payload will subsequently be executed when the block's data is viewed or edited by an administrator leading to complete server takeover (RCE).The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 8.9 with a vector of CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H.  Thanks Nguyễn Văn Thiện https://github.com/Thien225409  for reporting

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS ≤9.5.0 allows RCE via insecure deserialization in the ExpressEntryList block controller, bypassable by rogue admins through the REST API.

Vulnerability

Concrete CMS versions 9.5.0 and below contain a remote code execution (RCE) vulnerability in the ExpressEntryList block controller. The root cause is insecure deserialization of user-controlled data stored in the block's filterFields database column. Although the intended protection mechanism (_fromCIF === true) normally restricts malicious inputs over form POST requests, the REST API parses requests using json_decode(). This causes the string "true" to be evaluated as a strict PHP boolean true, thereby bypassing the protection [1].

Exploitation

An attacker who already holds administrative privileges (a rogue administrator) and has permissions to add blocks to an area can exploit this vulnerability. By leveraging the REST API functionality, the attacker can inject a malicious serialized payload into the filterFields column without triggering the _fromCIF check. No additional authentication or network access beyond that of a rogue admin is required, though the CVSS vector indicates a need for high privileges and some attack complexity [1].

Impact

Successful exploitation leads to complete server takeover. When the block's data is subsequently viewed or edited by any administrator, the malicious serialized payload is deserialized, resulting in remote code execution with full system control. The impact covers confidentiality, integrity, and availability of both the vulnerable system and its surrounding environment (CVSS 4.0 score of 8.9 with vector AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) [1].

Mitigation

The vulnerability is patched in Concrete CMS version 9.5.1. The release notes confirm that the fix includes using Express Entry Public Identifier strings instead of sequential IDs for better security, and general bug fixes that address the insecure deserialization path [1]. Administrators are strongly advised to upgrade to version 9.5.1 or later immediately.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.