CVE-2026-8134 PUBLISHED

Concrete CMS 9.5.0 and below is vulnerable to Authenticated RCE via Composer customTemplate Path Traversal leading to PHP File Inclusion

Assigner: ConcreteCMS
Reserved: 07.05.2026 Published: 21.05.2026 Updated: 22.05.2026

Concrete CMS 9.5.0 and below fails to sanitize path traversal sequences in the ptComposerFormLayoutSetControlCustomTemplate field when saving page type composer form layouts. An authenticated rogue administrator with composer form editing rights can exploit this to include arbitrary readable files on the server. Combined with the file uploader's extension-only validation (which permits PHP code in files saved with image extensions like .png), this can result in authenticated remote code execution. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 9.4 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H   Thanks Yonatan Drori (Tenzai) for reporting.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor Concrete CMS
Product Concrete CMS
Versions Default: unaffected
  • affected from 5.0 to 9.5.0 (incl.)

Credits

  • Yonatan Drori (Tenzai) finder

References

Problem Types

  • CWE-98 Improper control of filename for Include/Require statement in PHP program ('PHP remote file inclusion') CWE
  • CWE-434 Unrestricted upload of file with dangerous type CWE
  • CWE-23 Relative path traversal CWE

Impacts

  • CAPEC-252 PHP Local File Inclusion