{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:36:07.065","vulnerabilities":[{"cve":{"id":"CVE-2024-1246","sourceIdentifier":"ff5b8ace-8b95-4078-9743-eac1ca5451de","published":"2024-02-09T20:15:54.573","lastModified":"2024-11-21T08:50:08.877","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Concrete CMS in version 9 before 9.2.5 is vulnerable to reflected XSS via the Image URL Import Feature due to insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user’s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. This does not affect Concrete versions prior to version 9.\n"},{"lang":"es","value":"Concrete CMS en la versión 9 anterior a la 9.2.5 es vulnerable al XSS reflejado a través de la función de importación de URL de imagen debido a una validación insuficiente de los datos proporcionados por el administrador. Un administrador deshonesto podría inyectar código malicioso al importar imágenes, lo que provocaría la ejecución del código malicioso en el navegador del usuario del sitio web. El equipo de seguridad de Concrete CMS obtuvo este 2 con el vector CVSS v3 AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. Esto no afecta a las versiones de Concrete anteriores a la versión 9."}],"metrics":{"cvssMetricV31":[{"source":"ff5b8ace-8b95-4078-9743-eac1ca5451de","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N","baseScore":2.0,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.5,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"ff5b8ace-8b95-4078-9743-eac1ca5451de","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.2.5","matchCriteriaId":"4B4CD16D-4D2C-45DC-ACAC-E107A4909305"}]}]}],"references":[{"url":"https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes","source":"ff5b8ace-8b95-4078-9743-eac1ca5451de","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory","source":"ff5b8ace-8b95-4078-9743-eac1ca5451de","tags":["Vendor Advisory"]},{"url":"https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}