CVE-2026-8203
Stored XSS in Concrete CMS via Height Parameter
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: ConcreteCMS
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| concrete_cms | concrete_cms | to 9.5.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to serious security issues including session hijacking and credential theft. Attackers can execute malicious JavaScript in the browsers of visitors, potentially gaining unauthorized access to user accounts or sensitive information.
This can compromise the integrity and confidentiality of user data and may result in unauthorized actions performed on behalf of legitimate users.
Can you explain this vulnerability to me?
This vulnerability exists in Concrete CMS version 9.5.0 and below, where the height parameter is vulnerable to Stored Cross-Site Scripting (XSS). The controller does not validate or sanitize the $height parameter, allowing any user with editor privileges to inject malicious JavaScript code.
When this malicious script executes in the context of a visitor's browser, it can perform harmful actions such as session hijacking, stealing credentials, or other malicious activities.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows users with editor privileges to inject malicious JavaScript that can execute in visitors' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.
Such security issues can impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of user data and prevention of unauthorized access or data breaches.
However, the provided information does not explicitly state the direct effects on compliance with these standards.