NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-8327
Summary

Concrete CMS below 9.5.0 and below is vulnerable to password change without reauthorization and session-hardening bypass. The user-profile edit controller passes the entire raw POST array to UserInfo::update() without field whitelisting resulting in password change without requiring the current password  and also resulting in registered users able to disable the per-user-IP-pinning in the session validator which is meant to detect hijacking.  The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 5.3 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks 0x4c616e for reporting.

Publication Date May 22, 2026, 7:16 a.m.
Registration Date May 23, 2026, 4:07 a.m.
Last Update May 22, 2026, 7:16 a.m.
Related information, measures and tools
Common Vulnerabilities List