PatchSiren cyber security CVE debrief
CVE-2026-7879 Concrete CMS CVE debrief
CVE-2026-7879 describes an authorization bypass in Concrete CMS 9.5.0 and below. The submit_password() method in concrete/controllers/single_page/download_file.php can allow file downloads without properly enforcing view_file permission checks. As described by the vendor/NVD record, this means non-passworded files can be downloaded even when access should be restricted, and password-protected files can be downloaded by anyone who knows the password regardless of file access permission. The issue was scored CVSS v4.0 6.3 (Medium) and reported by Youssef Eid.
- Vendor
- Concrete CMS
- Product
- Unknown
- CVSS
- MEDIUM 6.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-21
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-21
- Advisory updated
- 2026-05-21
Who should care
Administrators and operators of Concrete CMS sites running 9.5.0 or earlier, especially deployments that rely on permission-restricted or password-protected file downloads. Security teams should also review any integrations or workflows that expose the affected download endpoint.
Technical summary
The flaw is an improper authorization issue (CWE-862) in the download_file controller’s submit_password() path. According to the supplied record, the affected logic bypasses the view_file permission check during download handling. That creates an access-control gap where restricted files may be retrieved without the expected authorization decision, including password-protected files when the password is known but the user lacks the underlying file permission.
Defensive priority
Medium
Recommended defensive actions
- Review Concrete CMS installations for versions 9.5.0 and below and prioritize upgrading to the vendor-fixed release referenced in the 9.5.1 release notes.
- Audit file-download access controls and confirm that view_file permissions are enforced before any download or password-handling step.
- Restrict exposure of sensitive files until patches are applied, and re-check any content libraries that depend on password-only gating.
- Validate logs for unexpected access to restricted download endpoints and investigate any anomalous retrievals of protected files.
Evidence notes
The vulnerability description in the supplied CVE record states that submit_password() in concrete/controllers/single_page/download_file.php bypasses the view_file permission check. NVD also associates the issue with CWE-862 (missing authorization). The only supplied vendor reference is the Concrete CMS 9.5.1 release notes URL, which supports that this is a Concrete CMS issue and provides the vendor-linked remediation context.
Official resources
-
CVE-2026-7879 CVE record
CVE.org
-
CVE-2026-7879 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
ff5b8ace-8b95-4078-9743-eac1ca5451de
Publicly disclosed on 2026-05-21. The record credits Youssef Eid for reporting the issue. This debrief avoids exploit details and focuses on defensive impact and remediation.