Concrete CMS is vulnerable to XML external entity. The vulnerability exists in dataToXml
function in Sanitizer.php
, which allows an attacker to inject and execute malicious code into the system due to improper sanitization of SVGs, leading to IP disclosure.
documentation.concretecms.org/developers/introduction/version-history/8510-release-notes
documentation.concretecms.org/developers/introduction/version-history/913-release-notes
github.com/concretecms/concretecms-core/commit/2d22e1e5c000669960b8637b2c516faf8bdff721
github.com/concretecms/concretecms-core/commit/448d397ee19a2e18f347531ed16454c5afd08ae5
github.com/concretecms/concretecms/commit/11d549e1aad20b906f8bbdf0c022584a01bb9a91
github.com/concretecms/concretecms/commit/37d3a6da32affae47e439dfe4f8f4c25929516e9
github.com/concretecms/concretecms/releases/8.5.10
github.com/concretecms/concretecms/releases/9.1.3
www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31