CVE-2026-8434
Received Received - Intake
Cross-Site Request Forgery in Concrete CMS

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: ConcreteCMS

Description
Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescanMultiple(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vectorΒ CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. ThanksΒ Yonatan Drori (Tenzai) for reporting.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
concrete_cms concrete_cms to 9.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1275 The SameSite attribute for sensitive cookies is not set, or an insecure value is used.
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Concrete CMS versions before 9.5.0 and is a Cross Site Request Forgery (CSRF) issue located at the concrete/controllers/backend/file rescanMultiple() function.

CSRF vulnerabilities allow an attacker to trick a user into performing actions on a web application in which they are authenticated, without their consent.


How can this vulnerability impact me? :

The impact of this vulnerability is relatively low, as indicated by its CVSS v4.0 base score of 2.3.

An attacker could potentially cause a user to unintentionally trigger the rescanMultiple() function, which may lead to unintended file rescanning operations within Concrete CMS.

However, the vulnerability requires user interaction (UI:P) and does not grant elevated privileges (PR:N), limiting its potential impact.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart