CVE-2022-43692

Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS - user can cause an administrator to trigger reflected XSS with a url if the targeted administrator is using an old browser that lacks XSS protection. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:27

Type Values Removed Values Added
References () https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes - Release Notes, Vendor Advisory () https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes - Release Notes, Vendor Advisory
References () https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes - Release Notes, Vendor Advisory () https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes - Release Notes, Vendor Advisory
References () https://github.com/concretecms/concretecms/releases/8.5.10 - Patch, Release Notes, Third Party Advisory () https://github.com/concretecms/concretecms/releases/8.5.10 - Patch, Release Notes, Third Party Advisory
References () https://github.com/concretecms/concretecms/releases/9.1.3 - Patch, Release Notes, Third Party Advisory () https://github.com/concretecms/concretecms/releases/9.1.3 - Patch, Release Notes, Third Party Advisory
References () https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31 - Vendor Advisory () https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31 - Vendor Advisory

Information

Published : 2022-11-14 19:15

Updated : 2024-11-21 07:27


NVD link : CVE-2022-43692

Mitre link : CVE-2022-43692

CVE.ORG link : CVE-2022-43692


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')