CVE-2022-43690
PHP vulnerability analysis and mitigation

Overview

Concrete CMS (formerly concrete5) versions below 8.5.10 and between 9.0.0 and 9.1.2 contained a vulnerability related to legacy password authentication. The vulnerability (CVE-2022-43690) was discovered in October 2022 and was fixed with the release of versions 8.5.10+ and 9.1.3+ (Concrete Advisory).

Technical details

The vulnerability stemmed from the improper implementation of comparison operations in the legacy_salt functionality, where non-strict comparison was used instead of strict comparison when testing against the legacy password algorithm. This could potentially lead to integer conversion issues. The vulnerability received a CVSS v3.1 score of 3.1 (Low) with the vector string AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N (Concrete Advisory).

Impact

The vulnerability could potentially lead to a limited authentication bypass under very specific conditions. This would only be exploitable if: the system was used to compare integers instead of strings, the targeted user signed up when the site was running concrete5 ~v5.4, the user had not logged in since the site was updated above v5.4, and the password hash for the user was generated in a specific way to look like an integer (e.g., "0b1111111") (Concrete Advisory).

Mitigation and workarounds

The vulnerability was addressed in Concrete CMS versions 8.5.10+ and 9.1.3+. The fix involved implementing strict comparison when testing against the legacy password algorithm. Users are advised to upgrade to these versions or later to remediate the vulnerability (Release Notes).

Community reactions

The vulnerability was discovered and reported by security researchers Bogdan and Adrian Tiron from FORTBRIDGE during their 2022 annual penetration testing and vulnerability assessment of Concrete CMS Hosting and the open source project (Concrete Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management