CVE-2026-7879
Received Received - Intake
Unauthorized File Access in Concrete CMS

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: ConcreteCMS

Description
In Concrete CMS 9.5.0 and below,Β  the submit_password() method in concrete/controllers/single_page/download_file.php allows unauthorized file access since downloading permission-restricted files bypasses the view_file permission check.Β Files without passwords can be downloaded and any user who knows a file's password can download a password protected file regardless of whether they have permission to access the file.Β The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 6.3 with vectorΒ CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N.Β  ThanksΒ Youssef Eid for reporting
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concrete_cms concrete_cms to 9.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Concrete CMS version 9.5.0 and below, specifically in the submit_password() method located in concrete/controllers/single_page/download_file.php.

The issue allows unauthorized file access because the system bypasses the usual permission check (view_file) when downloading files that are permission-restricted.

As a result, files without passwords can be downloaded by anyone, and files that are password protected can be downloaded by any user who knows the file's password, regardless of whether they have permission to access the file.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to files that should be restricted.

Users without proper permissions may be able to download sensitive or confidential files, either because the files have no password or because they know the password, bypassing the intended access controls.

This could result in data leakage, exposure of sensitive information, and potential misuse of the accessed files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart