CVE-2026-7879
Unauthorized File Access in Concrete CMS
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: ConcreteCMS
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| concrete_cms | concrete_cms | to 9.5.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Concrete CMS version 9.5.0 and below, specifically in the submit_password() method located in concrete/controllers/single_page/download_file.php.
The issue allows unauthorized file access because the system bypasses the usual permission check (view_file) when downloading files that are permission-restricted.
As a result, files without passwords can be downloaded by anyone, and files that are password protected can be downloaded by any user who knows the file's password, regardless of whether they have permission to access the file.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to files that should be restricted.
Users without proper permissions may be able to download sensitive or confidential files, either because the files have no password or because they know the password, bypassing the intended access controls.
This could result in data leakage, exposure of sensitive information, and potential misuse of the accessed files.