VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8413

CVE-2026-8413

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/dialog/page/bulk/design. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Concrete CMS 9 before 9.5.0 allows an unauthenticated attacker to perform design bulk operations on behalf of a logged-in admin with minimal impact.

Vulnerability

Overview

The vulnerability is a Cross-Site Request Forgery (CSRF) issue in Concrete CMS 9 versions prior to 9.5.0, specifically within the concrete/controllers/dialog/page/bulk/design component. This flaw allows an attacker to craft a malicious request that can perform bulk design operations on pages, such as changing page design properties, without the victim user's consent [1]. The root cause is the lack of CSRF protection on the affected endpoint, making it possible to induce authenticated users into performing unintended actions.

Exploitation

Scenario

To exploit this, an attacker needs to trick a logged-in administrator or user with sufficient privileges into clicking a crafted link or visiting a malicious page while they have an active session with Concrete CMS. The CVSS vector indicates the attack requires some physical or logical access (AT:P) but no privileges (PR:N) and low complexity (AC:L). User interaction (UI:P) is required, meaning the victim must perform a simple action like clicking a link [1].

Impact

Successful exploitation allows the attacker to trigger bulk design actions on pages, potentially altering the visual layout or theme settings of the site's pages. However, the CVSS score is 2.3 (Low) because the impact on confidentiality, integrity, and availability is limited (VC:N, VI:L, VA:N). The attack does not impact system confidentiality or availability, and only minimally affects integrity by modifying page design properties [1].

Mitigation

The issue is fixed in Concrete CMS version 9.5.0 and later. Users running Concrete CMS 9 should update to 9.5.0 or the subsequently released 9.5.1, which includes additional bug fixes [1]. No workarounds are mentioned in the references, so upgrading is the recommended action.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.