Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14ajMzLThyNDMtcjIyN84AAwKC
Concrete CMS vulnerable to cross-site scripting in the text input field
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XSS in the text input field since the result dashboard page output is not sanitized. The Concrete CMS security team has ranked this 4.2 with CVSS v3.1 vector AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Remediate by updating to Concrete CMS 8.5.10 and Concrete CMS 9.1.3.
Permalink: https://github.com/advisories/GHSA-xj33-8r43-r227JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14ajMzLThyNDMtcjIyN84AAwKC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 4 months ago
CVSS Score: 4.2
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Identifiers: GHSA-xj33-8r43-r227, CVE-2022-43556
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-43556
- https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes
- https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes
- https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31
- https://github.com/advisories/GHSA-xj33-8r43-r227
Affected Packages
packagist:concrete5/concrete5
Versions: >= 9.0.0, < 9.1.3, < 8.5.10Fixed in: 9.1.3, 8.5.10