CVE-2026-8421
Received Received - Intake
CSRF to RCE in Concrete CMS

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: ConcreteCMS

Description
Concrete CMS 9.5.0 and below contains a CSRF vulnerability in the install_package() method of concrete/controllers/single_page/dashboard/extend/install.php.  An attacker who can cause an authenticated administrator to visit a crafted page,  and who has placed or caused a package to be present under DIR_PACKAGES/<handle>/, can force the installation of that package without any CSRF protection. Package installation executes the package controller's install() method as the web server user, enabling remote code execution.  In order to be vulnerable, the victim must be passing canInstallPackages. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 7.5 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. Thanks  https://github.com/maru1009  for reporting.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concrete_cms concrete_cms to 9.5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Concrete CMS version 9.5.0 and below, specifically in the install_package() method of the install.php controller. It is a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to force the installation of a package without any CSRF protection.

For the attack to succeed, an authenticated administrator must visit a crafted page controlled by the attacker, and the attacker must have placed or caused a package to be present under the DIR_PACKAGES directory. The package installation executes the package controller's install() method as the web server user.

This can lead to remote code execution on the server. The victim must have the permission to install packages (canInstallPackages) for the vulnerability to be exploitable.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized remote code execution on the server hosting Concrete CMS.

An attacker can exploit this by tricking an authenticated administrator into visiting a malicious page, which then forces the installation of a malicious package.

This can lead to full compromise of the web server, data breaches, defacement, or further attacks within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart