VYPR
Low severityNVD Advisory· Published May 21, 2026

CVE-2026-8434

CVE-2026-8434

Description

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescanMultiple(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Yonatan Drori (Tenzai) for reporting.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Concrete CMS 9 before 9.5.0 contains a CSRF vulnerability in the file rescanMultiple() controller method, allowing unintended file rescan actions.

Vulnerability

Overview

Concrete CMS versions 9 prior to 9.5.0 are vulnerable to a Cross-Site Request Forgery (CSRF) in the concrete/controllers/backend/file controller's rescanMultiple() method. The vulnerability allows an attacker to trick an authenticated admin user into unknowingly triggering a file rescan action, as the endpoint lacks proper CSRF token validation or origin checks [1].

Exploitation

Prerequisites

Exploitation requires an authenticated administrator to visit a malicious page or click a crafted link while logged into Concrete CMS. The attack is network-based, requires no special privileges beyond the victim's session, and has a low attack complexity though limited by the need for user interaction. The CVSS v4.0 vector (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) confirms that authentication is not required for the attacker, but the target must have active admin credentials [1].

Impact

Successful exploitation results in low integrity impact on the application, with no confidentiality or availability effects. The attacker can force the system to rescan files, potentially causing minor operational disruptions or unintended changes to file metadata but cannot modify or exfiltrate data [1].

Mitigation

The fix is included in Concrete CMS version 9.5.0 and later, as documented in the 9.5.1 Release Notes [1]. Users should upgrade to the latest version to remediate this vulnerability. No workarounds are provided.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

36