{"uuid": "ca21728f-d754-4b62-b001-7dd78bfd466a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43693", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14050", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43693\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Concrete CMS is vulnerable to CSRF due to the lack of \"State\" parameter for external Concrete authentication service for users of Concrete who use the \"out of the box\" core OAuth.\n\ud83d\udccf Published: 2022-11-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T15:09:16.135Z\n\ud83d\udd17 References:\n1. https://github.com/concretecms/concretecms/releases/9.1.3\n2. https://github.com/concretecms/concretecms/releases/8.5.10\n3. https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes\n4. https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes\n5. https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31", "creation_timestamp": "2025-04-30T15:13:31.000000Z"}