VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8410

CVE-2026-8410

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/dialog/logs/bulk/delete.  The The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9 before 9.5.0 is vulnerable to CSRF in the bulk delete dialog controller, allowing unauthorized deletion of logs via a crafted request.

Vulnerability

Overview

Concrete CMS versions 9 prior to 9.5.0 contain a Cross-Site Request Forgery (CSRF) vulnerability in the concrete/controllers/dialog/logs/bulk/delete endpoint [1]. The root cause is the lack of CSRF protection (such as a token or same-origin check) on this bulk delete action, allowing an attacker to trick an authenticated administrator into performing unintended deletion of log entries [1].

Exploitation

Conditions

The attack requires the victim to be logged into Concrete CMS as a user with permission to delete logs, and to click a malicious link or visit a crafted page while authenticated [1]. No authentication is required for the attacker, but the victim's session is used. The complexity is low, but attack requires some precision (AT:P) as the victim must be targeted [1]. Prerequisites include that the victim can be enticed to interact with the malicious request and that the attacker does not need special network position.

Impact

If exploited, an attacker can force the deletion of log entries without the victim's consent, potentially destroying evidence of other malicious activity [1]. The impact on integrity is low (VI:L), while confidentiality and availability are not affected [1]. The CVSS v4.0 score is 2.3, reflecting the low severity [1].

Mitigation

Concrete CMS 9.5.0 and later contain the fix for this issue [1]. Users should upgrade to version 9.5.0 or higher. No workaround is mentioned in the official release notes, although general CSRF protections (tokens) are recommended for custom implementations [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.