{"id":78698,"date":"2026-05-21T23:46:39","date_gmt":"2026-05-21T20:16:39","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-8135-concrete-cms-9-5-0-and-below-is-vulnerable-to-rce-due-to-insecure-deserialization-occurring-in-the-expressentrylist-block-controller\/"},"modified":"2026-05-21T23:46:39","modified_gmt":"2026-05-21T20:16:39","slug":"cve-2026-8135-concrete-cms-9-5-0-and-below-is-vulnerable-to-rce-due-to-insecure-deserialization-occurring-in-the-expressentrylist-block-controller","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-8135-concrete-cms-9-5-0-and-below-is-vulnerable-to-rce-due-to-insecure-deserialization-occurring-in-the-expressentrylist-block-controller\/","title":{"rendered":"CVE-2026-8135 &#8211; Concrete CMS 9.5.0 and below is vulnerable to RCE due to insecure deserialization occurring in the ExpressEntryList block controller."},"content":{"rendered":"<p>CVE ID :CVE-2026-8135<\/p>\n<p>  Published : May 21, 2026, 8:16 p.m. | 43\u00a0minutes ago<\/p>\n<p>  Description :Concrete CMS 9.5.0 and below is vulnerable to Remote Code Execution  due to insecure deserialization occurring in the\u00a0ExpressEntryList\u00a0block controller. An rogue administrator with privileges to add blocks to an area can bypass the intended protection mechanism (_fromCIF === true), which normally restricts malicious inputs over form POST requests, by leveraging the REST API functionality. Because the REST API parses requests using json_decode(), the string &#8220;true&#8221; is evaluated as a strict PHP Boolean(true).\u00a0 This bypass allows the attacker to inject a malicious serialized payload \u00a0into the block&#8217;s filterFields database column. The payload will subsequently be executed when the block&#8217;s data is viewed or edited by an administrator leading to complete server takeover (RCE).The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 8.9 with a vector of\u00a0CVSS:4.0\/AV:N\/AC:H\/AT:P\/PR:H\/UI:N\/VC:H\/VI:H\/VA:H\/SC:H\/SI:H\/SA:H.\u00a0 Thanks  Nguy\u1ec5n V\u0103n Thi\u1ec7n https:\/\/github.com\/Thien225409 \u00a0for reporting<\/p>\n<p>  Severity: 8.9 | HIGH<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-8135 Published : May 21, 2026, 8:16 p.m. | 43\u00a0minutes ago Description :Concrete CMS 9.5.0 and below is vulnerable to Remote Code Execution due to insecure deserialization occurring in the\u00a0ExpressEntryList\u00a0block controller. An rogue administrator with privileges to add blocks to an area can bypass the intended protection mechanism (_fromCIF === true), which normally &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78698","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78698"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78698\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}