CVE-2026-8237
Received Received - Intake
Insecure Direct Object Reference in Concrete CMS

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: ConcreteCMS

Description
Concrete CMS 9.5.0 and below is vulnerable to IDOR.Β The `/ccm/frontend/conversations/message_detail` endpoint returns the full content of any conversation message. An unauthenticated attacker can enumerate all conversation messages, including messages from restricted pages, member-only areas, and the moderation queue. File attachments with download URLs are also exposed.Β The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score ofΒ 6.3 with VectorΒ CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks Eldudareeno for reporting.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concrete5 concrete_cms to 9.5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Insecure Direct Object Reference (IDOR) in Concrete CMS version 9.5.0 and below. It occurs at the /ccm/frontend/conversations/message_detail endpoint, which returns the full content of any conversation message.

An unauthenticated attacker can exploit this flaw to enumerate all conversation messages, including those from restricted pages, member-only areas, and the moderation queue. Additionally, file attachments with download URLs are exposed through this vulnerability.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker to access sensitive conversation messages and file attachments that should be restricted. This can lead to unauthorized disclosure of private or confidential information.

Because the attacker does not need to be authenticated, the risk of data leakage is significant, potentially exposing user communications, internal discussions, or sensitive files to unauthorized parties.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an unauthenticated attacker to access full content of any conversation message, including those from restricted pages, member-only areas, and the moderation queue, as well as file attachments with download URLs.

Such unauthorized access to potentially sensitive or personal information could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require protection of personal and sensitive data from unauthorized disclosure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart