Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8428
PUBLISHED
More InfoOfficial Page
Assigner-ConcreteCMS
Assigner Org ID-ff5b8ace-8b95-4078-9743-eac1ca5451de
View Known Exploited Vulnerability (KEV) details
Published At-21 May, 2026 | 20:24
Updated At-22 May, 2026 | 13:23
Rejected At-
▼CVE Numbering Authority (CNA)
CSRF token is not validated in the core CMS update controller for Concrete CMS 9.5.0 and below

Concrete CMS 9.5.0 and below emits a CSRF token in the local_available_update.php view ($token->output('do_update')) but the corresponding do_update() method in concrete/controllers/single_page/dashboard/system/update/update.php never calls $this->token->validate('do_update'). The form is rendered as a POST form, meaning the token reaches the browser, but because the controller discards it without verification, an attacker can craft a cross-site POST that triggers a core CMS update to an attacker-specified version string.  In order to be vulnerable, theictim must be passing canUpgrade()anda valid update version must be present under DIR_CORE_UPDATES. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 7.5 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. Thanks https://github.com/maru1009 for reporting.

Affected Products
Vendor
Concrete CMS
Product
Concrete CMS
Collection URL
https://github.com/concretecms/concretecms
Repo
https://github.com/concretecms/concretecms
Default Status
unaffected
Versions
Affected
  • From 5.0 through 9.5.0 (git)
Problem Types
TypeCWE IDDescription
CWECWE-352CWE-352 Cross-Site request forgery (CSRF)
CWECWE-829CWE-829 Inclusion of functionality from untrusted control sphere
Type: CWE
CWE ID: CWE-352
Description: CWE-352 Cross-Site request forgery (CSRF)
Type: CWE
CWE ID: CWE-829
Description: CWE-829 Inclusion of functionality from untrusted control sphere
Metrics
VersionBase scoreBase severityVector
4.07.5HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-186CAPEC-186 Malicious Software Update
CAPEC ID: CAPEC-186
Description: CAPEC-186 Malicious Software Update
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://documentation.concretecms.org/9-x/developers/introduction/version-history/951-release-notes
release-notes
Hyperlink: https://documentation.concretecms.org/9-x/developers/introduction/version-history/951-release-notes
Resource:
release-notes
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found