CVE-2026-3452
Received Received - Intake
Remote Code Execution via PHP Object Injection in Concrete CMS

Publication date: 2026-03-04

Last updated on: 2026-03-04

Assigner: ConcreteCMS

Description
Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by stored PHP object injection into the Express Entry List block via the columns parameter. An authenticated administrator can store attacker-controlled serialized data in block configuration fields that are later passed to unserialize() without class restrictions or integrity checks. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 8.9 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. Thanks YJK ( @YJK0805 https://hackerone.com/yjk0805 ) of ZUSO ART https://zuso.ai/  for reporting.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-03-04
Generated
2026-05-06
AI Q&A
2026-03-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concretecms concrete_cms to 9.4.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Concrete CMS versions below 9.4.8 have a vulnerability that allows Remote Code Execution through stored PHP object injection. This occurs in the Express Entry List block via the columns parameter. An authenticated administrator can inject attacker-controlled serialized data into block configuration fields. These fields are later passed to the PHP unserialize() function without any class restrictions or integrity checks, enabling the execution of malicious code.


How can this vulnerability impact me? :

This vulnerability can lead to Remote Code Execution on the affected system, which means an attacker with administrator access can execute arbitrary code. This can compromise the entire system, potentially allowing the attacker to take full control, access sensitive data, modify or delete information, and disrupt services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart