CVE-2026-8327 PUBLISHED

Concrete CMS below 9.5.0 and below is vulnerable to password change without reauthorization and session-hardening bypass.

Assigner: ConcreteCMS
Reserved: 11.05.2026 Published: 21.05.2026 Updated: 22.05.2026

Concrete CMS below 9.5.0 and below is vulnerable to password change without reauthorization and session-hardening bypass. The user-profile edit controller passes the entire raw POST array to UserInfo::update() without field whitelisting resulting in password change without requiring the current password  and also resulting in registered users able to disable the per-user-IP-pinning in the session validator which is meant to detect hijacking.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 5.3 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks 0x4c616e for reporting.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor Concrete CMS
Product Concrete CMS
Versions Default: unaffected
  • affected from 5 to 9.5.0 (incl.)

Credits

  • 0x4c616e finder

References

Problem Types

  • CWE-915 Improperly controlled modification of Dynamically-Determined object attributes CWE
  • CWE-620 Unverified password change CWE
  • CWE-269 Improper Privilege Management CWE

Impacts

  • CAPEC-77 Manipulating User-Controlled Variables