VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8415

CVE-2026-8415

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/dialog/express/association/reorder. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9 before 9.5.0 has a CSRF vulnerability in the Express Association reorder dialog, allowing low-impact unauthorized actions.

Vulnerability

Overview

CVE-2026-8415 is a Cross-Site Request Forgery (CSRF) vulnerability affecting Concrete CMS versions 9 prior to 9.5.0. The flaw exists in the concrete/controllers/dialog/express/association/reorder endpoint, which does not properly validate or require a unique token for state-changing requests. This allows an attacker to trick an authenticated administrator into performing unintended actions, such as reordering Express associations, without their consent [1].

Exploitation

Conditions

Exploitation requires the attacker to craft a malicious link or form and convince a logged-in Concrete CMS administrator to interact with it. No special network position is needed beyond standard web access, and the attack does not require authentication on the attacker's part. The CVSS v4.0 score of 2.3 (Low) reflects the low impact and the need for user interaction [1].

Impact

If successfully exploited, an attacker can cause the victim's browser to send a forged request to reorder Express associations. The impact is limited to low-integrity changes; no confidentiality breach or availability impact is noted. The Concrete CMS security team assessed the vector as AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N, indicating no direct data exposure or system compromise [1].

Mitigation

The vulnerability is fixed in Concrete CMS version 9.5.0 and later. Users running versions before 9.5.0 should upgrade to the latest release. The 9.5.1 release notes also include related security improvements, such as using public identifiers instead of sequential IDs for Express entries, which may reduce the attack surface [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.