CVE-2026-8411
Description
Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/dialog/page/bulk/delete. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Concrete CMS 9 before 9.5.0 contains a CSRF vulnerability in the bulk page delete dialog that could allow an attacker to trick a user into unintended page deletions.
Description
Concrete CMS versions 9 before 9.5.0 are vulnerable to a Cross-Site Request Forgery (CSRF) attack in the concrete/controllers/dialog/page/bulk/delete endpoint. The vulnerability arises from a lack of sufficient CSRF protections on this particular controller action, allowing an attacker to craft a malicious request that, when executed by an authenticated administrator, will perform bulk page deletions without the user's consent [1].
Exploitation
To exploit the issue, an attacker must trick an authenticated user—typically an administrator with page deletion permissions—into clicking a crafted link or visiting a malicious page while logged into the Concrete CMS instance. The CSRF attack requires no authentication from the attacker (PR:N), but depends on user interaction (UI:P) and a protected target (AT:P) [1]. The vulnerability is network-accessible (AV:N) with low complexity (AC:L), but the low severity reflects the need for user participation and the limited impact.
Impact
Successful exploitation allows an attacker to delete pages in bulk, causing data loss or disruption of the site's content structure. The impact is limited to integrity (VI:L) with no confidentiality or availability consequences, resulting in a CVSS v4.0 base score of 2.3 (Low severity) [1].
Mitigation
The vulnerability is fixed in Concrete CMS version 9.5.0. Users should upgrade to 9.5.0 or later to mitigate the risk. The Concrete CMS security team has acknowledged the report by Yonatan Drori (Tenzai) [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <9.5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.