VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8433

CVE-2026-8433

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescan(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9 before 9.5.0 is vulnerable to a CSRF attack in the file rescan controller, allowing an attacker to trigger unintended actions on behalf of an authenticated user.

Vulnerability

Description

Concrete CMS versions 9 before 9.5.0 contain a Cross-Site Request Forgery (CSRF) vulnerability in the file rescan controller at /concrete/controllers/backend/file rescan(). This bug allows an attacker to craft a malicious request that, when triggered by an authenticated user, performs unintended operations on the server without the user's consent. The issue stems from insufficient anti-CSRF token validation in the file rescan endpoint [1].

Exploitation and

Attack Surface

Exploitation requires the attacker to trick a logged-in administrative user into unknowingly submitting a forged request, typically via a crafted link or script embedded in a third-party site. The attack vector is network-based and requires user interaction (e.g., clicking a link). No authentication is required by the attacker, but the victim must be authenticated. The attack is low complexity but requires the attacker to reach a specific endpoint [1].

Impact

Successful exploitation results in low integrity impact—the attacker can trigger server-side file rescan operations that may alter file metadata or cause minor data integrity issues, but the vulnerability does not expose confidential data. The CVSS v4.0 score is 2.3, reflecting minimal severity due to the need for user interaction and the limited scope of impact [1].

Mitigation

The vulnerability is fixed in Concrete CMS version 9.5.0, released with the 9.5.1 update. Users are strongly advised to upgrade to version 9.5.1 or later. The vendor also notes behavioral improvements and additional bug fixes in the release notes for this version [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

36