CVE-2022-43693: Concrete CMS vulnerable to Cross-site Request Forgery
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64075%
CWE
Published
11/14/2022
Updated
1/29/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| concrete5/concrete5 | composer | < 8.5.10 | 8.5.10 |
| concrete5/concrete5 | composer | >= 9.0.0RC1, < 9.1.3 | 9.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing state parameter validation in the OAuth flow. The patch notes explicitly mention adding state parameter handling, which is a critical CSRF protection mechanism in OAuth2. The AbstractService class would logically contain authorization handling code, and ExternalUserProvider would handle authentication validation - both would require state parameter validation to prevent CSRF. The high confidence comes from: 1) Official patch notes specifically mentioning state parameter addition 2) Standard OAuth2 security requirements 3) Concrete CMS's architecture patterns for authentication handling.