Report: CVE-2026-8327 - Concrete CMS below 9.5.0 and below is vulnerable to password change without reaut

Report: CVE-2026-8327 - Concrete CMS below 9.5.0 and below is vulnerable to password change without reaut

CVE ID :CVE-2026-8327 Published : May 21, 2026, 10:16 p.m. | 46 minutes ago Description :Concrete CMS below 9.5.0 and below is vulnerable to password change without reauthorization and session-hardening bypass. The user-profile edit controller passes the entire raw POST array to UserInfo::update() without field whitelisting resulting in password change without requiring the current password  and also resulting in registered users able to disable the per-user-IP-pinning in the session validator which is meant to detect hijacking.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 5.3 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks 0x4c616e for reporting. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
CVSS Score
4.0 / 10.0
Published
May 21, 2026