
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A Cross Site Scripting (XSS) vulnerability was identified in Concrete CMS versions before 9.2.3, tracked as CVE-2023-44764. The vulnerability exists in the Name parameter during installation (also known as Site of Installation or Settings), allowing attackers to execute arbitrary code via crafted scripts (NVD, Concrete Docs).
The vulnerability is a stored XSS issue that occurs during the installation process or in the Settings section. An attacker can inject malicious JavaScript code through the SITE parameter, which is then stored and executed when users access the web page. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.4 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (NVD).
When successfully exploited, the vulnerability allows attackers to execute arbitrary JavaScript code in the context of users' browsers who visit the affected web pages. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected users (GitHub POC).
The vulnerability has been fixed in Concrete CMS version 9.2.3. Users are advised to upgrade to this version or later to address the security issue. The fix was implemented in commit 11764 (Concrete Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”