Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8426
PUBLISHED
More InfoOfficial Page
Assigner-ConcreteCMS
Assigner Org ID-ff5b8ace-8b95-4078-9743-eac1ca5451de
View Known Exploited Vulnerability (KEV) details
Published At-21 May, 2026 | 20:22
Updated At-22 May, 2026 | 12:13
Rejected At-
▼CVE Numbering Authority (CNA)
Concrete CMS 9.5.0 and below is vulnerable to CSRF on prepare_remote_upgrade() leading to one-request RCE via package overwrite

Concrete CMS 9.5.0 and below does not validate a CSRF token before processing requests to /dashboard/extend/update/prepare_remote_upgrade/<remoteMPID>. An attacker who controls the remote package returned for a known marketplace item ID can overwrite the package PHP on disk and force its upgrade() method to execute in a single browser navigation. This results in remote code execution as the web server user.   In order to be vulnerable, the victim must be passing canInstallPackages, victim site must be connected to the Concrete marketplace; and the attacker controls the package returned for a marketplace item ID already installed on the victim site. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 7.5 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. Thanks https://github.com/maru1009 for reporting.

Affected Products
Vendor
Concrete CMS
Product
Concrete CMS
Collection URL
https://github.com/concretecms/concretecms
Repo
https://github.com/concretecms/concretecms
Default Status
unaffected
Versions
Affected
  • From 5.0 through 9.5.0 (git)
Problem Types
TypeCWE IDDescription
CWECWE-352CWE-352 Cross-Site request forgery (CSRF)
CWECWE-829CWE-829 Inclusion of functionality from untrusted control sphere
Type: CWE
CWE ID: CWE-352
Description: CWE-352 Cross-Site request forgery (CSRF)
Type: CWE
CWE ID: CWE-829
Description: CWE-829 Inclusion of functionality from untrusted control sphere
Metrics
VersionBase scoreBase severityVector
4.07.5HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-657CAPEC-657 Malicious Automated Software Update via Spoofing
CAPEC ID: CAPEC-657
Description: CAPEC-657 Malicious Automated Software Update via Spoofing
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://documentation.concretecms.org/9-x/developers/introduction/version-history/951-release-notes
release-notes
Hyperlink: https://documentation.concretecms.org/9-x/developers/introduction/version-history/951-release-notes
Resource:
release-notes
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found