CVE-2026-8426 PUBLISHED

Concrete CMS 9.5.0 and below is vulnerable to CSRF on prepare_remote_upgrade() leading to one-request RCE via package overwrite

Assigner: ConcreteCMS
Reserved: 12.05.2026 Published: 21.05.2026 Updated: 22.05.2026

Concrete CMS 9.5.0 and below does not validate a CSRF token before processing requests to /dashboard/extend/update/prepare_remote_upgrade/<remoteMPID>. An attacker who controls the remote package returned for a known marketplace item ID can overwrite the package PHP on disk and force its upgrade() method to execute in a single browser navigation. This results in remote code execution as the web server user.   In order to be vulnerable, the victim must be passing canInstallPackages, victim site must be connected to the Concrete marketplace; and the attacker controls the package returned for a marketplace item ID already installed on the victim site. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 7.5 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. Thanks https://github.com/maru1009 for reporting.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7.5

Product Status

Vendor Concrete CMS
Product Concrete CMS
Versions Default: unaffected
  • affected from 5.0 to 9.5.0 (incl.)

References

Problem Types

  • CWE-352 Cross-Site request forgery (CSRF) CWE
  • CWE-829 Inclusion of functionality from untrusted control sphere CWE

Impacts

  • CAPEC-657 Malicious Automated Software Update via Spoofing