VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8411

CVE-2026-8411

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/dialog/page/bulk/delete. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9 before 9.5.0 contains a CSRF vulnerability in the bulk page delete dialog that could allow an attacker to trick a user into unintended page deletions.

Description

Concrete CMS versions 9 before 9.5.0 are vulnerable to a Cross-Site Request Forgery (CSRF) attack in the concrete/controllers/dialog/page/bulk/delete endpoint. The vulnerability arises from a lack of sufficient CSRF protections on this particular controller action, allowing an attacker to craft a malicious request that, when executed by an authenticated administrator, will perform bulk page deletions without the user's consent [1].

Exploitation

To exploit the issue, an attacker must trick an authenticated user—typically an administrator with page deletion permissions—into clicking a crafted link or visiting a malicious page while logged into the Concrete CMS instance. The CSRF attack requires no authentication from the attacker (PR:N), but depends on user interaction (UI:P) and a protected target (AT:P) [1]. The vulnerability is network-accessible (AV:N) with low complexity (AC:L), but the low severity reflects the need for user participation and the limited impact.

Impact

Successful exploitation allows an attacker to delete pages in bulk, causing data loss or disruption of the site's content structure. The impact is limited to integrity (VI:L) with no confidentiality or availability consequences, resulting in a CVSS v4.0 base score of 2.3 (Low severity) [1].

Mitigation

The vulnerability is fixed in Concrete CMS version 9.5.0. Users should upgrade to 9.5.0 or later to mitigate the risk. The Concrete CMS security team has acknowledged the report by Yonatan Drori (Tenzai) [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.