Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43967: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43967cvecve-2022-43967
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the multilingual report due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.

AI-Powered Analysis

AILast updated: 07/06/2025, 18:09:35 UTC

Technical Analysis

CVE-2022-43967 is a reflected Cross-Site Scripting (XSS) vulnerability affecting Concrete CMS versions below 8.5.10 and between 9.0.0 and 9.1.2. The vulnerability arises from un-sanitized output in the multilingual report feature, which allows an attacker to inject malicious scripts that are reflected back to the user. This type of vulnerability can be exploited by tricking a user into clicking a specially crafted URL or interacting with a manipulated web page, causing the victim's browser to execute attacker-controlled JavaScript code. The CVSS 3.1 base score of 6.1 indicates a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction. The impact affects confidentiality and integrity but does not affect availability. The vulnerability scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. Concrete CMS is a popular open-source content management system used for building and managing websites. The reflected XSS vulnerability could be leveraged to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites. The recommended remediation is to update Concrete CMS to version 9.1.3 or later, or 8.5.10 or later, where the issue has been fixed by properly sanitizing output in the multilingual report. No known exploits in the wild have been reported to date, but the vulnerability is publicly disclosed and could be targeted by attackers seeking to compromise websites running vulnerable versions of Concrete CMS.

Potential Impact

For European organizations using Concrete CMS, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Attackers exploiting the reflected XSS could hijack user sessions, leading to unauthorized access to sensitive information or administrative functions. This is particularly concerning for organizations managing personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. The vulnerability could also be used to deface websites or distribute malware via malicious redirects, damaging organizational reputation. Since Concrete CMS is used by a variety of sectors including government, education, and small to medium enterprises, the impact could be widespread. The requirement for user interaction (clicking a malicious link) means social engineering could be used to increase attack success. However, the lack of known active exploits reduces immediate risk but does not eliminate it. Organizations hosting multilingual websites are especially at risk due to the vulnerability residing in the multilingual report feature. Overall, the threat could disrupt trust in web services and lead to compliance issues if exploited.

Mitigation Recommendations

European organizations should prioritize upgrading Concrete CMS installations to version 9.1.3 or 8.5.10 and above to remediate this vulnerability. Beyond patching, organizations should implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts, reducing the impact of potential XSS attacks. Web Application Firewalls (WAFs) can be configured to detect and block reflected XSS payloads targeting the multilingual report endpoints. Regular security audits and code reviews of custom CMS plugins or themes should be conducted to ensure no additional XSS vectors exist. User awareness training should emphasize caution with unsolicited links, especially those that appear to interact with site reports or administrative functions. Logging and monitoring for unusual URL parameters or error messages related to the multilingual report can help detect attempted exploitation. Finally, organizations should maintain an inventory of CMS versions in use to ensure timely patch management and vulnerability tracking.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-27T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecc4d

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 6:09:35 PM

Last updated: 2/7/2026, 6:23:31 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats