PatchSiren cyber security CVE debrief
CVE-2026-8433 Concrete CMS CVE debrief
CVE-2026-8433 is a low-severity CSRF issue affecting Concrete CMS 9 before 9.5.0. The vulnerable path is concrete/controllers/backend/file rescan(), and the vendor-assigned CVSS v4.0 score is 2.3 with a vector indicating network reachability, required user interaction, and limited integrity impact. The issue was publicly recorded on 2026-05-21, and the supplied corpus identifies Yonatan Drori (Tenzai) as the reporter.
- Vendor
- Concrete CMS
- Product
- Unknown
- CVSS
- LOW 2.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-21
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-21
- Advisory updated
- 2026-05-21
Who should care
Concrete CMS 9 administrators, security owners, and developers maintaining deployments before 9.5.0 should review this issue, especially if backend admin functionality is exposed to regular users or if file-rescan workflows are part of operational processes.
Technical summary
The supplied NVD record describes a Cross-Site Request Forgery condition in Concrete CMS 9 before 9.5.0 at concrete/controllers/backend/file rescan(). The CVSS v4.0 vector is CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N, which aligns with a network-reachable flaw that requires user interaction and has limited integrity impact. NVD also lists CWE-352 and CWE-1275 as associated weakness classes.
Defensive priority
Low; patch during routine maintenance, but do not leave affected versions in place after an upgrade is available.
Recommended defensive actions
- Upgrade Concrete CMS 9 to 9.5.0 or later.
- Review backend access controls around file-rescan functionality and ensure only intended administrators can reach it.
- Confirm that CSRF protections are enabled and functioning on custom integrations or overrides touching backend controller actions.
- If you operate affected systems, verify the deployed version and plan remediation before the next routine maintenance window.
Evidence notes
All statements are derived from the supplied CVE description and the NVD modified record. The corpus states that Concrete CMS 9 before 9.5.0 is vulnerable to CSRF in concrete/controllers/backend/file rescan(), assigns CVSS v4.0 2.3, and lists the associated vector and weakness classes. The NVD reference list includes a Concrete CMS release-notes URL, but the supplied corpus does not provide additional vendor advisory text beyond the CVE description.
Official resources
-
CVE-2026-8433 CVE record
CVE.org
-
CVE-2026-8433 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
ff5b8ace-8b95-4078-9743-eac1ca5451de
Publicly disclosed in the CVE record on 2026-05-21. The Concrete CMS security team assigned CVSS v4.0 2.3, and the record credits Yonatan Drori (Tenzai) for reporting. The supplied enrichment does not mark this CVE as a CISA KEV entry.