
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-28471 is a stored Cross-Site Scripting (XSS) vulnerability affecting Concrete CMS (previously known as concrete5) in versions 9.0 through 9.1.3. The vulnerability was discovered and disclosed in April 2023, specifically impacting the container name functionality within the content management system (Concrete Advisory, NVD).
The vulnerability stems from insufficient sanitization of container names in the CMS. When creating or modifying containers, the system failed to properly sanitize user input, allowing for the injection of malicious JavaScript payloads. The vulnerability has been assigned a CVSS v3.1 base score of 2.0 (LOW) with the vector string AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N, indicating that it requires high privileges and user interaction to exploit (Concrete Advisory).
The successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of other users' browsers who view the affected container name. Given the high privilege requirement and user interaction needed, the impact is considered relatively limited (Concrete Advisory).
The vulnerability has been fixed in Concrete CMS version 9.2. Organizations using affected versions (9.0 through 9.1.3) should upgrade to version 9.2 or later to address this security issue. It's worth noting that versions below 9.0 are not affected by this vulnerability as they do not use containers (CVE Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."