Vulnerabilites related to Contao - Contao
CVE-2020-25768 (GCVE-0-2020-25768)
Vulnerability from cvelistv5
Published
2020-10-07 20:37
Modified
2024-08-04 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
References
▼ | URL | Tags |
---|---|---|
https://community.contao.org/en/forumdisplay.php?4-Announcements | x_refsource_MISC | |
https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T20:37:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://community.contao.org/en/forumdisplay.php?4-Announcements", "refsource": "MISC", "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25768", "datePublished": "2020-10-07T20:37:52", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19745 (GCVE-0-2019-19745)
Vulnerability from cvelistv5
Published
2019-12-17 14:17
Modified
2024-08-05 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/unrestricted-file-uploads.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T14:17:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19745", "datePublished": "2019-12-17T14:17:35", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-08-05T02:25:12.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-26265 (GCVE-0-2022-26265)
Vulnerability from cvelistv5
Published
2022-03-18 22:57
Modified
2024-08-03 04:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-18T22:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-26265", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md", "refsource": "MISC", "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-26265", "datePublished": "2022-03-18T22:57:01", "dateReserved": "2022-02-28T00:00:00", "dateUpdated": "2024-08-03T04:56:37.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-57757 (GCVE-0-2025-57757)
Vulnerability from cvelistv5
Published
2025-08-28 16:32
Modified
2025-08-28 17:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not adding protected news archives to the news feed page.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-w53m-gxvg-vx7p | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/e75f46b11974fbf7a4652e65c19ad6ca84c59271 | x_refsource_MISC | |
https://contao.org/en/security-advisories/information-disclosure-in-the-news-module | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57757", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T17:45:40.665521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T17:48:36.124Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 5.0.0-RC1, \u003c 5.3.38" }, { "status": "affected", "version": "\u003e= 5.4.0-RC1, \u003c 5.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not adding protected news archives to the news feed page." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T16:32:03.487Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-w53m-gxvg-vx7p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-w53m-gxvg-vx7p" }, { "name": "https://github.com/contao/contao/commit/e75f46b11974fbf7a4652e65c19ad6ca84c59271", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/e75f46b11974fbf7a4652e65c19ad6ca84c59271" }, { "name": "https://contao.org/en/security-advisories/information-disclosure-in-the-news-module", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-news-module" } ], "source": { "advisory": "GHSA-w53m-gxvg-vx7p", "discovery": "UNKNOWN" }, "title": "Contao discloses information in the news module" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57757", "datePublished": "2025-08-28T16:32:03.487Z", "dateReserved": "2025-08-19T15:16:22.916Z", "dateUpdated": "2025-08-28T17:48:36.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28191 (GCVE-0-2024-28191)
Vulnerability from cvelistv5
Published
2024-04-09 13:54
Modified
2024-08-02 00:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28191", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T16:07:38.376776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T16:07:45.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" }, { "name": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "name": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:57:41.636Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" }, { "name": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "name": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" } ], "source": { "advisory": "GHSA-747v-52c4-8vj8", "discovery": "UNKNOWN" }, "title": "Contao may have unencoded insert tags in the frontend" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28191", "datePublished": "2024-04-09T13:54:22.129Z", "dateReserved": "2024-03-06T17:35:00.859Z", "dateUpdated": "2024-08-02T00:48:49.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-36806 (GCVE-0-2023-36806)
Vulnerability from cvelistv5
Published
2023-07-25 18:47
Modified
2025-02-13 16:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:08.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "name": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "name": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "name": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "tags": [ "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.9.42", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "4.10.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.13.28", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "5.0.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "5.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36806", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T18:55:31.237529Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T18:59:20.202Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.9.42" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.13.28" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.1.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-21T00:01:30.770Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "name": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "name": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "name": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ], "source": { "advisory": "GHSA-4gpr-p634-922x", "discovery": "UNKNOWN" }, "title": "Contao cross site scripting vulnerability via input unit widget" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36806", "datePublished": "2023-07-25T18:47:34.415Z", "dateReserved": "2023-06-27T15:43:18.382Z", "dateUpdated": "2025-02-13T16:56:24.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37626 (GCVE-0-2021-37626)
Vulnerability from cvelistv5
Published
2021-08-11 22:20
Modified
2024-08-04 01:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.56" }, { "status": "affected", "version": "\u003e= 4.5.0, \u003c 4.9.18" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.11.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T22:20:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ], "source": { "advisory": "GHSA-r6mv-ppjc-4hgr", "discovery": "UNKNOWN" }, "title": "PHP file inclusion via insert tags", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37626", "STATE": "PUBLIC", "TITLE": "PHP file inclusion via insert tags" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003e= 4.0.0, \u003c 4.4.56" }, { "version_value": "\u003e= 4.5.0, \u003c 4.9.18" }, { "version_value": "\u003e= 4.10.0, \u003c 4.11.7" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "name": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ] }, "source": { "advisory": "GHSA-r6mv-ppjc-4hgr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37626", "datePublished": "2021-08-11T22:20:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28190 (GCVE-0-2024-28190)
Vulnerability from cvelistv5
Published
2024-04-09 13:48
Modified
2024-08-02 00:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce | x_refsource_MISC | |
https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d | x_refsource_MISC | |
https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28190", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:12:31.297580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:30.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" }, { "name": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "name": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:57:49.326Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" }, { "name": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "name": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" } ], "source": { "advisory": "GHSA-v24p-7p4j-qvvf", "discovery": "UNKNOWN" }, "title": "Contao core bundle vulnerable to cross site scripting in the file manager" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28190", "datePublished": "2024-04-09T13:48:46.324Z", "dateReserved": "2024-03-06T17:35:00.859Z", "dateUpdated": "2024-08-02T00:48:49.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45398 (GCVE-0-2024-45398)
Vulnerability from cvelistv5
Published
2024-09-17 19:56
Modified
2024-09-18 13:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThanOrEqual": "4.13.49", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThanOrEqual": "5.3.15", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThanOrEqual": "5.4.3", "status": "affected", "version": "5.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45398", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:14:03.501932Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:17:36.013Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e=4.0.0, \u003c 4.13.49" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.15" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:56:00.791Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5" }, { "name": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads" } ], "source": { "advisory": "GHSA-vm6r-j788-hjh5", "discovery": "UNKNOWN" }, "title": "Remote command execution through file upload in contao/core-bundle" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45398", "datePublished": "2024-09-17T19:56:00.791Z", "dateReserved": "2024-08-28T20:21:32.802Z", "dateUpdated": "2024-09-18T13:17:36.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-10125 (GCVE-0-2018-10125)
Vulnerability from cvelistv5
Published
2020-03-16 14:40
Modified
2024-08-05 07:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao before 4.5.7 has XSS in the system log.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:32:01.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao before 4.5.7 has XSS in the system log." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T14:40:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao before 4.5.7 has XSS in the system log." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-10125", "datePublished": "2020-03-16T14:40:15", "dateReserved": "2018-04-16T00:00:00", "dateUpdated": "2024-08-05T07:32:01.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45612 (GCVE-0-2024-45612)
Vulnerability from cvelistv5
Published
2024-09-17 18:29
Modified
2024-09-18 14:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThan": "4.13.49", "status": "affected", "version": "4.13.0", "versionType": "custom" }, { "lessThan": "5.3.15", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThan": "5.4.3", "status": "affected", "version": "5.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45612", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T14:06:58.302616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:09:48.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.13.0, \u003c 4.13.49" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.15" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T18:29:27.210Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls" } ], "source": { "advisory": "GHSA-2xpq-xp6c-5mgj", "discovery": "UNKNOWN" }, "title": "Insert tag injection via canonical URL in Contao" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45612", "datePublished": "2024-09-17T18:29:27.210Z", "dateReserved": "2024-09-02T16:00:02.425Z", "dateUpdated": "2024-09-18T14:09:48.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24899 (GCVE-0-2022-24899)
Vulnerability from cvelistv5
Published
2022-05-05 23:45
Modified
2025-04-23 18:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c | x_refsource_MISC | |
https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24899", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:55:05.099859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:29:58.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T23:45:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ], "source": { "advisory": "GHSA-m8x6-6r63-qvj2", "discovery": "UNKNOWN" }, "title": "Cross site scripting via canonical tag", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24899", "STATE": "PUBLIC", "TITLE": "Cross site scripting via canonical tag" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003c 4.13.3" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c", "refsource": "MISC", "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ] }, "source": { "advisory": "GHSA-m8x6-6r63-qvj2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24899", "datePublished": "2022-05-05T23:45:13.000Z", "dateReserved": "2022-02-10T00:00:00.000Z", "dateUpdated": "2025-04-23T18:29:58.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11512 (GCVE-0-2019-11512)
Vulnerability from cvelistv5
Published
2019-07-09 20:33
Modified
2024-08-04 22:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news/security-vulnerability-cve-2019-11512.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:40.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-09T20:33:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html", "refsource": "MISC", "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11512", "datePublished": "2019-07-09T20:33:49", "dateReserved": "2019-04-24T00:00:00", "dateUpdated": "2024-08-04T22:55:40.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28235 (GCVE-0-2024-28235)
Vulnerability from cvelistv5
Published
2024-04-09 15:50
Modified
2024-08-02 00:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:31:57.807830Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:52.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" }, { "name": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "name": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "name": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "name": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.9.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0-RC1, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T15:50:56.531Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" }, { "name": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "name": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "name": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "name": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" } ], "source": { "advisory": "GHSA-9jh5-qf84-x6pr", "discovery": "UNKNOWN" }, "title": "Contao possible cookie sharing with external domains while checking protected pages for broken links" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28235", "datePublished": "2024-04-09T15:50:56.531Z", "dateReserved": "2024-03-07T14:33:30.035Z", "dateUpdated": "2024-08-02T00:48:49.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-29790 (GCVE-0-2025-29790)
Vulnerability from cvelistv5
Published
2025-03-18 18:36
Modified
2025-03-18 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29790", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-18T18:48:29.028406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-18T18:48:39.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.54" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.30" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T18:36:34.279Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads" } ], "source": { "advisory": "GHSA-vqqr-fgmh-f626", "discovery": "UNKNOWN" }, "title": "Contao allows cross-site scripting through SVG uploads" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29790", "datePublished": "2025-03-18T18:36:34.279Z", "dateReserved": "2025-03-11T14:23:00.476Z", "dateUpdated": "2025-03-18T18:48:39.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30262 (GCVE-0-2024-30262)
Vulnerability from cvelistv5
Published
2024-04-09 16:45
Modified
2024-08-02 01:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable "Allow auto login" in the login module.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5 | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30262", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:19:06.729095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:39:15.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" }, { "name": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T16:45:57.132Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" }, { "name": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" } ], "source": { "advisory": "GHSA-r4r6-j2j3-7pp5", "discovery": "UNKNOWN" }, "title": "Contao\u0027s remember-me tokens will not be cleared after a password change" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-30262", "datePublished": "2024-04-09T16:45:57.132Z", "dateReserved": "2024-03-26T12:52:00.935Z", "dateUpdated": "2024-08-02T01:32:07.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-29200 (GCVE-0-2023-29200)
Vulnerability from cvelistv5
Published
2023-04-25 17:00
Modified
2025-02-03 19:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3 | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df | x_refsource_MISC | |
https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" }, { "name": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-29200", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T19:37:07.056816Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:37:13.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 4.9.40" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.13.21" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T17:00:29.537Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" }, { "name": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" } ], "source": { "advisory": "GHSA-fp7q-xhhw-6rj3", "discovery": "UNKNOWN" }, "title": "contao/core-bundle has path traversal vulnerability in the file manager" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-29200", "datePublished": "2023-04-25T17:00:29.537Z", "dateReserved": "2023-04-03T13:37:18.454Z", "dateUpdated": "2025-02-03T19:37:13.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-57758 (GCVE-0-2025-57758)
Vulnerability from cvelistv5
Published
2025-08-28 16:32
Modified
2025-08-28 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn't check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not relying solely on the voter and additionally to check USER_CAN_ACCESS_MODULE.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-7m47-r75r-cx8v | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/3f05c603e1c94d34819f837f060df5d66447d0d7 | x_refsource_MISC | |
https://contao.org/en/security-advisories/improper-access-control-in-the-back-end-voters | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57758", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T17:19:56.119408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T17:20:01.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.38" }, { "status": "affected", "version": "\u003e= 5.4.0-RC1, \u003c 5.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn\u0027t check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not relying solely on the voter and additionally to check USER_CAN_ACCESS_MODULE." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T16:32:38.664Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-7m47-r75r-cx8v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-7m47-r75r-cx8v" }, { "name": "https://github.com/contao/contao/commit/3f05c603e1c94d34819f837f060df5d66447d0d7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/3f05c603e1c94d34819f837f060df5d66447d0d7" }, { "name": "https://contao.org/en/security-advisories/improper-access-control-in-the-back-end-voters", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/improper-access-control-in-the-back-end-voters" } ], "source": { "advisory": "GHSA-7m47-r75r-cx8v", "discovery": "UNKNOWN" }, "title": "Contao has improper access control in the back end voters" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57758", "datePublished": "2025-08-28T16:32:38.664Z", "dateReserved": "2025-08-19T15:16:22.916Z", "dateUpdated": "2025-08-28T17:20:01.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45604 (GCVE-0-2024-45604)
Vulnerability from cvelistv5
Published
2024-09-17 19:56
Modified
2024-09-18 13:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45604", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:09:34.002818Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:09:48.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.49" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:56:02.588Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget" } ], "source": { "advisory": "GHSA-4p75-5p53-65m9", "discovery": "UNKNOWN" }, "title": "Directory traversal in the file selector widget in contao/core-bundle" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45604", "datePublished": "2024-09-17T19:56:02.588Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:09:48.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35210 (GCVE-0-2021-35210)
Vulnerability from cvelistv5
Published
2021-06-23 09:34
Modified
2024-08-04 00:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html | x_refsource_CONFIRM | |
https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-23T09:34:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35210", "datePublished": "2021-06-23T09:34:44", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-08-04T00:33:51.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-57756 (GCVE-0-2025-57756)
Vulnerability from cvelistv5
Published
2025-08-28 16:31
Modified
2025-08-28 17:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-2xmj-8wmq-7475 | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/a03976c459b6f3985a28f6488b82a76ffb6c0514 | x_refsource_MISC | |
https://contao.org/en/security-advisories/information-disclosure-in-the-front-end-search-index | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57756", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T17:49:20.516549Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T17:49:26.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.9.14, \u003c 4.13.56" }, { "status": "affected", "version": "\u003e= 5.0.0-RC1, \u003c 5.3.38" }, { "status": "affected", "version": "\u003e= 5.4.0-RC1, \u003c 5.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-612", "description": "CWE-612: Improper Authorization of Index Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T16:31:40.295Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-2xmj-8wmq-7475", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-2xmj-8wmq-7475" }, { "name": "https://github.com/contao/contao/commit/a03976c459b6f3985a28f6488b82a76ffb6c0514", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/a03976c459b6f3985a28f6488b82a76ffb6c0514" }, { "name": "https://contao.org/en/security-advisories/information-disclosure-in-the-front-end-search-index", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-front-end-search-index" } ], "source": { "advisory": "GHSA-2xmj-8wmq-7475", "discovery": "UNKNOWN" }, "title": "Contao discloses sensitive information in the front end search index" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57756", "datePublished": "2025-08-28T16:31:40.295Z", "dateReserved": "2025-08-19T15:16:22.916Z", "dateUpdated": "2025-08-28T17:49:26.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35955 (GCVE-0-2021-35955)
Vulnerability from cvelistv5
Published
2021-08-12 14:33
Modified
2024-08-04 00:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html | x_refsource_MISC | |
https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:42.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao \u003e=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T14:33:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao \u003e=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html", "refsource": "MISC", "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp", "refsource": "MISC", "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35955", "datePublished": "2021-08-12T14:33:44", "dateReserved": "2021-06-29T00:00:00", "dateUpdated": "2024-08-04T00:47:42.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5478 (GCVE-0-2018-5478)
Vulnerability from cvelistv5
Published
2023-09-21 00:00
Modified
2024-09-24 18:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:40:50.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "tags": [ "x_transferred" ], "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-5478", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:43:11.768607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:43:21.305Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-21T05:12:18.942696", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-5478", "datePublished": "2023-09-21T00:00:00", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-09-24T18:43:21.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4383 (GCVE-0-2012-4383)
Vulnerability from cvelistv5
Published
2020-01-29 14:42
Modified
2024-08-06 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- SQL injection
Summary
contao prior to 2.11.4 has a sql injection vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/14 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "prior to 2.11" } ] } ], "descriptions": [ { "lang": "en", "value": "contao prior to 2.11.4 has a sql injection vulnerability" } ], "problemTypes": [ { "descriptions": [ { "description": "SQL injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-29T14:42:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "prior to 2.11" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contao prior to 2.11.4 has a sql injection vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SQL injection" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2012/08/31/14", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4383", "datePublished": "2020-01-29T14:42:06", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37627 (GCVE-0-2021-37627)
Vulnerability from cvelistv5
Published
2021-08-11 22:50
Modified
2024-08-04 01:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.4.56" }, { "status": "affected", "version": "\u003e= 4.5.0, \u003c 4.9.18" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.11.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T22:50:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ], "source": { "advisory": "GHSA-hq5m-mqmx-fw6m", "discovery": "UNKNOWN" }, "title": "Privilege escalation via form generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37627", "STATE": "PUBLIC", "TITLE": "Privilege escalation via form generator" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003c 4.4.56" }, { "version_value": "\u003e= 4.5.0, \u003c 4.9.18" }, { "version_value": "\u003e= 4.10.0, \u003c 4.11.7" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269: Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "name": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ] }, "source": { "advisory": "GHSA-hq5m-mqmx-fw6m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37627", "datePublished": "2021-08-11T22:50:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28234 (GCVE-0-2024-28234)
Vulnerability from cvelistv5
Published
2024-04-09 13:59
Modified
2024-08-02 00:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Summary
Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments.
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2 | x_refsource_MISC | |
https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2 | x_refsource_MISC | |
https://contao.org/en/security-advisories/insufficient-bbcode-sanitization | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28234", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T20:01:41.857651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:38.950Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" }, { "name": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "name": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "name": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:59:41.300Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" }, { "name": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "name": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "name": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" } ], "source": { "advisory": "GHSA-j55w-hjpj-825g", "discovery": "UNKNOWN" }, "title": "Contao has insufficient BBCode sanitizer" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28234", "datePublished": "2024-04-09T13:59:41.300Z", "dateReserved": "2024-03-07T14:33:30.034Z", "dateUpdated": "2024-08-02T00:48:49.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19714 (GCVE-0-2019-19714)
Vulnerability from cvelistv5
Published
2019-12-17 14:04
Modified
2024-08-05 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T14:04:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19714", "datePublished": "2019-12-17T14:04:03", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45965 (GCVE-0-2024-45965)
Vulnerability from cvelistv5
Published
2024-10-02 00:00
Modified
2025-08-27 21:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:5.4.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "5.4.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45965", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T20:29:10.374330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-27T21:27:09.128Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Contao", "vendor": "Contao", "versions": [ { "lessThan": "4.13.54", "status": "affected", "version": "4.0.0", "versionType": "semver" }, { "lessThan": "5.3.30", "status": "affected", "version": "5.0.0", "versionType": "semver" }, { "lessThan": "5.5.6", "status": "affected", "version": "5.4.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.13.54", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.3.30", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.5.6", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T19:04:03.032Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb" }, { "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-45965", "datePublished": "2024-10-02T00:00:00.000Z", "dateReserved": "2024-09-11T00:00:00.000Z", "dateUpdated": "2025-08-27T21:27:09.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-57759 (GCVE-0-2025-57759)
Vulnerability from cvelistv5
Published
2025-08-28 16:32
Modified
2025-08-28 17:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6.1. There are no workarounds.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57759", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T17:16:51.325478Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T17:16:55.904Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 5.3.0, \u003c 5.3.38" }, { "status": "affected", "version": "\u003e= 5.4.0-RC1, \u003c 5.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6.1. There are no workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T16:32:59.022Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-qqfq-7cpp-hcqj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-qqfq-7cpp-hcqj" }, { "name": "https://github.com/contao/contao/commit/80ee7db12d55ad979d9b1b180f273d4e2668851f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/80ee7db12d55ad979d9b1b180f273d4e2668851f" }, { "name": "https://contao.org/en/security-advisories/improper-privilege-management-for-page-and-article-fields", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/improper-privilege-management-for-page-and-article-fields" } ], "source": { "advisory": "GHSA-qqfq-7cpp-hcqj", "discovery": "UNKNOWN" }, "title": "Contao has improper privilege management for page and article fields" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57759", "datePublished": "2025-08-28T16:32:59.022Z", "dateReserved": "2025-08-19T15:16:22.916Z", "dateUpdated": "2025-08-28T17:16:55.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19712 (GCVE-0-2019-19712)
Vulnerability from cvelistv5
Published
2019-12-17 13:59
Modified
2024-08-05 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T13:59:38", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19712", "datePublished": "2019-12-17T13:59:38", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-01-29 15:15
Modified
2024-11-21 01:42
Severity ?
Summary
contao prior to 2.11.4 has a sql injection vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/08/31/14 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/08/31/14 | Mailing List, Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "394FF1F6-21C4-4145-B917-400DAD0D7659", "versionEndExcluding": "2.11.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "contao prior to 2.11.4 has a sql injection vulnerability" }, { "lang": "es", "value": "contao versiones anteriores a 2.11.4, presenta una vulnerabilidad de inyecci\u00f3n sql." } ], "id": "CVE-2012-4383", "lastModified": "2024-11-21T01:42:46.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-29T15:15:10.633", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-09 14:15
Modified
2025-01-17 15:39
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "302B7F92-FC7F-4E43-BEE2-7D493B03CB0C", "versionEndExcluding": "4.13.40", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "556D1F95-B80C-4819-BFC2-CF3EF735BBE6", "versionEndExcluding": "5.3.4", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character." }, { "lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.0.0 y antes de la versi\u00f3n 4.13.40 y 5.3.4, es posible inyectar etiquetas de inserci\u00f3n en formularios de interfaz si la salida est\u00e1 estructurada de una manera muy espec\u00edfica. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, no genere datos de usuario desde formularios de interfaz uno al lado del otro, sep\u00e1relos siempre con al menos un car\u00e1cter." } ], "id": "CVE-2024-28191", "lastModified": "2025-01-17T15:39:22.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-09T14:15:08.710", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-09 21:15
Modified
2024-11-21 04:21
Severity ?
Summary
Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "D576B87E-666C-41C5-912F-1669DCF1E982", "versionEndExcluding": "4.4.39", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "1726F7C9-886A-42EA-AFEB-276D0951937C", "versionEndExcluding": "4.7.5", "versionStartIncluding": "4.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5." }, { "lang": "es", "value": "Contao versiones 4.x , permite la inyecci\u00f3n SQL. Se corrigi\u00f3 en Contao versi\u00f3n 4.4.39 y Contao versi\u00f3n 4.7.5." } ], "id": "CVE-2019-11512", "lastModified": "2024-11-21T04:21:14.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-09T21:15:10.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-17 15:15
Modified
2024-11-21 04:35
Severity ?
Summary
Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AD2B857-54C5-4BC8-9D46-37EEE783D1A3", "versionEndIncluding": "4.4.45", "versionStartIncluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC371563-77B0-4C5F-A66C-E03C64C3779B", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DE7216A-3486-47CA-8D7F-1E65DB974A32", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "94C28910-F081-4039-AED5-BA41135B663A", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5A04634-8F66-4147-8175-DA09A57B3F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "022613D3-B240-479B-A3F5-A6459044A483", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6D63B7ED-B2FA-46A2-9471-ED363182F318", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA76FF3F-26FB-46B8-8179-D0E4985CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "C6495BA2-DB3D-4877-93A7-13C0ABC0B291", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server." }, { "lang": "es", "value": "Contao versiones 4.0 hasta 4.8.5, permite una inclusi\u00f3n de archivos locales PHP. Un usuario del back-end con acceso al generador de formularios puede cargar archivos arbitrarios y ejecutarlos sobre el servidor." } ], "id": "CVE-2019-19745", "lastModified": "2024-11-21T04:35:18.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-17T15:15:25.957", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-17 20:15
Modified
2024-09-25 19:22
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "E47DC0CF-1FA6-4AAC-88A6-A9616D017E2E", "versionEndExcluding": "4.13.49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Contao es un CMS de c\u00f3digo abierto. En las versiones afectadas, los usuarios autenticados en el back-end pueden incluir archivos fuera de la ra\u00edz del documento en el widget selector de archivos. Se recomienda a los usuarios que actualicen a Contao 4.13.49. No existen workarounds para esta vulnerabilidad." } ], "id": "CVE-2024-45604", "lastModified": "2024-09-25T19:22:09.533", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-17T20:15:04.893", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-09 17:16
Modified
2025-01-09 17:51
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Summary
Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable "Allow auto login" in the login module.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "481B6B86-03CA-4612-99A8-18381D0E16F2", "versionEndExcluding": "4.13.40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n" }, { "lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.13.40, cuando un miembro del frontend cambia su contrase\u00f1a en los datos personales o en el m\u00f3dulo de contrase\u00f1a perdida, los tokens de recordarme correspondientes no se eliminan. Si alguien compromete una cuenta y puede obtener un token de recuerdo, cambiar la contrase\u00f1a no ser\u00eda suficiente para recuperar el control de la cuenta. La versi\u00f3n 4.13.40 contiene una soluci\u00f3n para el problema. Como workaround, deshabilite \"Permitir inicio de sesi\u00f3n autom\u00e1tico\" en el m\u00f3dulo de inicio de sesi\u00f3n." } ], "id": "CVE-2024-30262", "lastModified": "2025-01-09T17:51:27.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-09T17:16:02.850", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" }, { "lang": "en", "value": "CWE-613" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-11 23:15
Modified
2024-11-21 06:15
Severity ?
8.0 (High) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE6152-30F2-4712-B4DD-08F091E9ADF9", "versionEndExcluding": "4.4.56", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4C67-BA49-46DD-A843-4D2F93B50FA3", "versionEndExcluding": "4.9.18", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F8DCD4-A7B8-4DD9-9A3C-5640D7284FF4", "versionEndExcluding": "4.11.7", "versionStartIncluding": "4.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8EB22924-9904-40AE-AD23-427B01985DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D89C4A4-3614-4C0E-A1EE-DC3166E635F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D19BB4B2-5649-4DF1-8DF8-49609647CD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F59C41A-1EC4-4B45-8A1F-FBBC90EB6FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DCF20BC-0B4A-4904-B1C9-FF72C83CB26D", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "134A6E73-9292-4F37-8D0A-088249B773BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "97184D33-21EC-4792-B40E-3C0E8972D400", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "78779300-D33E-4ACF-805F-F49B1D54DFED", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "30EBE2B6-34AC-41E0-ACAA-D3149A9A0BEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users." }, { "lang": "es", "value": "Contao es un CMS de c\u00f3digo abierto que permite la creaci\u00f3n de sitios y aplicaciones web escalables. En las versiones afectadas es posible obtener derechos privilegiados en el back-end de Contao. Las instalaciones s\u00f3lo est\u00e1n afectadas si tienen usuarios de back-end no confiables que tengan acceso al generador de formularios. Se recomienda a todos los usuarios que actualicen a Contao versiones 4.4.56, 4.9.18 o 4.11.7. Como soluci\u00f3n, los usuarios pueden desactivar el generador de formularios o desactivar el inicio de sesi\u00f3n para usuarios de back end no confiables" } ], "id": "CVE-2021-37627", "lastModified": "2024-11-21T06:15:33.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-11T23:15:07.847", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-17 15:15
Modified
2024-11-21 04:35
Severity ?
Summary
Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:4.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "2D981EEA-0349-4BA6-9FFC-163379923F52", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "1100BAC6-D470-4E79-93FE-AC7DE4F03226", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered." }, { "lang": "es", "value": "Contao versiones 4.8.4 y 4.8.5, presenta una Codificaci\u00f3n o Escape de Salida Inapropiada. Es posible inyectar etiquetas de inserci\u00f3n hacia el m\u00f3dulo de inicio de sesi\u00f3n que ser\u00e1n reemplazadas cuando la p\u00e1gina sea renderizada." } ], "id": "CVE-2019-19714", "lastModified": "2024-11-21T04:35:14.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-17T15:15:25.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-09 14:15
Modified
2025-01-02 17:49
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Summary
Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6D7972F-AE24-4CA4-8BB6-BCA79D6A2BAB", "versionEndExcluding": "4.13.40", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "556D1F95-B80C-4819-BFC2-CF3EF735BBE6", "versionEndExcluding": "5.3.4", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments." }, { "lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 2.0.0 y anteriores a las versiones 4.13.40 y 5.3.4, es posible inyectar estilos CSS a trav\u00e9s de BBCode en los comentarios. Las instalaciones s\u00f3lo se ven afectadas si BBCode est\u00e1 habilitado. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, desactive BBCode para comentarios." } ], "id": "CVE-2024-28234", "lastModified": "2025-01-02T17:49:55.720", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-09T14:15:08.897", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-23 11:15
Modified
2024-11-21 06:12
Severity ?
Summary
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB94BB9F-A64C-4ECD-8EBB-86BF97681CA3", "versionEndExcluding": "4.9.16", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB7BCDE1-3E94-4738-B3DF-B96A508A5585", "versionEndExcluding": "4.11.5", "versionStartIncluding": "4.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end." }, { "lang": "es", "value": "Contao versiones 4.5.x hasta 4.9.x anteriores a 4.9.16, y versiones 4.10.x hasta 4.11.x anteriores a 4.11.5, permite un ataque de tipo XSS. Es posible inyectar c\u00f3digo en la tabla tl_log que ser\u00e1 ejecutada en el navegador cuando el registro del sistema es llamado en el back end" } ], "id": "CVE-2021-35210", "lastModified": "2024-11-21T06:12:03.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-23T11:15:08.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-06 00:15
Modified
2024-11-21 06:51
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C0C3045-3E49-4FAB-AFA4-43D72F3FC346", "versionEndIncluding": "4.13.2", "versionStartIncluding": "4.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings." }, { "lang": "es", "value": "Contao es un potente CMS de c\u00f3digo abierto que permite crear sitios web profesionales y aplicaciones web escalables. En las versiones de Contao anteriores a 4.13.3 es posible inyectar c\u00f3digo en la etiqueta can\u00f3nica. Como medida de mitigaci\u00f3n, los usuarios pueden deshabilitar las etiquetas can\u00f3nicas en la configuraci\u00f3n de la p\u00e1gina root" } ], "id": "CVE-2022-24899", "lastModified": "2024-11-21T06:51:21.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-06T00:15:07.757", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-17 14:15
Modified
2024-11-21 04:35
Severity ?
Summary
Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://contao.org/en/news.html | Release Notes, Vendor Advisory | |
cve@mitre.org | https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://contao.org/en/news.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "349036F4-3FB9-4574-A568-3DF5F9C9A182", "versionEndIncluding": "4.4.45", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC371563-77B0-4C5F-A66C-E03C64C3779B", "versionEndIncluding": "4.8.5", "versionStartIncluding": "4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DE7216A-3486-47CA-8D7F-1E65DB974A32", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "94C28910-F081-4039-AED5-BA41135B663A", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5A04634-8F66-4147-8175-DA09A57B3F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "022613D3-B240-479B-A3F5-A6459044A483", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6D63B7ED-B2FA-46A2-9471-ED363182F318", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA76FF3F-26FB-46B8-8179-D0E4985CA98C", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "C6495BA2-DB3D-4877-93A7-13C0ABC0B291", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." }, { "lang": "es", "value": "Contao versiones 4.0 hasta la versi\u00f3n 4.8.5, tiene permisos no seguros. Los usuarios finales pueden manipular la URL de la vista de detalles para mostrar p\u00e1ginas y art\u00edculos que no han sido habilitados para ellos." } ], "id": "CVE-2019-19712", "lastModified": "2024-11-21T04:35:14.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-17T14:15:18.153", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://contao.org/en/news.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 20:15
Modified
2025-08-27 22:15
Severity ?
Summary
Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads | Vendor Advisory | |
cve@mitre.org | https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2B78795-5DC9-4D54-846D-B295A85D3FEE", "versionEndExcluding": "4.13.54", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DC1431E-AC3C-4A63-B1F1-9AEB22608F7F", "versionEndExcluding": "5.3.30", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0EF8-382F-4886-9DD0-7A15704CB0BA", "versionEndExcluding": "5.5.6", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6." }, { "lang": "es", "value": "Contao 5.4.1 permite que una cuenta de administrador autenticada cargue un archivo SVG que contenga c\u00f3digo JavaScript malicioso en el sistema de destino. Si se accede al archivo a trav\u00e9s del sitio web, podr\u00eda provocar un ataque de Cross-Site Scripting (XSS) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de un c\u00f3digo JavaScript manipulado espec\u00edficamente para el objetivo." } ], "id": "CVE-2024-45965", "lastModified": "2025-08-27T22:15:45.610", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2024-10-02T20:15:11.320", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Undergoing Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "cve@mitre.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-17 19:15
Modified
2024-09-23 19:33
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "654C764D-CA76-404D-8D37-FCD94B38C980", "versionEndExcluding": "4.13.49", "versionStartIncluding": "4.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "81742BA9-7293-4F0A-87B6-AEB4618143E6", "versionEndExcluding": "5.3.15", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB66A97A-A8FA-4D3A-8E93-6692772217AC", "versionEndExcluding": "5.4.3", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings." }, { "lang": "es", "value": "Contao es un CMS de c\u00f3digo abierto. En las versiones afectadas, un usuario no confiable puede insertar etiquetas de inserci\u00f3n en la etiqueta can\u00f3nica, que luego se reemplazan en la p\u00e1gina web (interfaz). Se recomienda a los usuarios que actualicen a Contao 4.13.49, 5.3.15 o 5.4.3. Los usuarios que no puedan actualizar deben deshabilitar las etiquetas can\u00f3nicas en la configuraci\u00f3n de la p\u00e1gina ra\u00edz." } ], "id": "CVE-2024-45612", "lastModified": "2024-09-23T19:33:04.650", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-17T19:15:28.250", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-21 06:15
Modified
2024-11-21 04:08
Severity ?
Summary
Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "A00793A4-3198-4D48-BEB8-47814317D9DE", "versionEndExcluding": "3.5.32", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension." }, { "lang": "es", "value": "Contao 3.x anterior a 3.5.32 permite XSS a trav\u00e9s del m\u00f3dulo de cancelaci\u00f3n de suscripci\u00f3n en la extensi\u00f3n del bolet\u00edn frontal." } ], "id": "CVE-2018-5478", "lastModified": "2024-11-21T04:08:52.957", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-21T06:15:12.223", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-25 19:15
Modified
2024-11-21 08:10
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "15E0A7C9-3A78-4D4B-8871-FD3299C55F06", "versionEndExcluding": "4.9.42", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5DDD8AD-0906-478A-BAB4-5B0B4C50C517", "versionEndExcluding": "4.13.28", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "11B3001D-C6B9-44C3-B477-ECD0C4BD3397", "versionEndExcluding": "5.1.10", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users." } ], "id": "CVE-2023-36806", "lastModified": "2024-11-21T08:10:38.097", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T19:15:11.550", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 18:15
Modified
2025-01-02 17:22
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "0982A888-B357-4141-9445-05BA4FB04A05", "versionEndExcluding": "4.9.40", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "374F1348-15EC-4952-B6B7-3E19BE0950DE", "versionEndExcluding": "4.13.21", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "F47206DC-DFB3-43F7-BD46-67C4893F1A37", "versionEndExcluding": "5.1.4", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds." } ], "id": "CVE-2023-29200", "lastModified": "2025-01-02T17:22:06.893", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-25T18:15:09.510", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-17 20:15
Modified
2024-09-25 19:20
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB4C5DCC-94CE-4732-8B71-0CB60FFF3B31", "versionEndExcluding": "4.13.49", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "44942DC5-6564-4F2B-9C2F-EA446C70E05F", "versionEndExcluding": "5.3.15", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB66A97A-A8FA-4D3A-8E93-6692772217AC", "versionEndExcluding": "5.4.3", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory." }, { "lang": "es", "value": "Contao es un CMS de c\u00f3digo abierto. En las versiones afectadas, un usuario de back-end con acceso al administrador de archivos puede cargar archivos maliciosos y ejecutarlos en el servidor. Se recomienda a los usuarios que actualicen a Contao 4.13.49, 5.3.15 o 5.4.3. A los usuarios que no puedan actualizar se les recomienda que configuren su servidor web para que no ejecute archivos PHP y otros scripts en el directorio de carga de archivos de Contao." } ], "id": "CVE-2024-45398", "lastModified": "2024-09-25T19:20:52.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-17T20:15:04.670", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-18 23:15
Modified
2024-11-21 06:53
Severity ?
Summary
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:1.5.0:-:*:*:managed:*:*:*", "matchCriteriaId": "EB3A177A-41B5-4598-A738-9B27B009FEF1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter." }, { "lang": "es", "value": "Se ha detectado que Contao Managed Edition versi\u00f3n v1.5.0, contiene una vulnerabilidad de ejecuci\u00f3n de comandos remota (RCE) por medio del par\u00e1metro php_cli del componente" } ], "id": "CVE-2022-26265", "lastModified": "2024-11-21T06:53:39.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-18T23:15:07.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-16 15:15
Modified
2024-11-21 03:40
Severity ?
Summary
Contao before 4.5.7 has XSS in the system log.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "5927C8B4-3FFC-4797-B5A5-D2330C0F9E39", "versionEndIncluding": "3.5.33", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "A514478C-1508-434C-9385-D1AE9EAE5B07", "versionEndIncluding": "4.4.16", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD3DF63-0B18-4E0B-8E41-0568FD6A4CB1", "versionEndIncluding": "4.5.6", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "DAF2C3C7-2DB3-4426-B82A-20F449716E60", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "FEA2BDD9-39CB-4CB8-916B-60068C2785BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "4E3B8396-5559-4707-891B-6A3BC826729F", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "96B8E805-A1C7-4474-8A83-BBA898394BDC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao before 4.5.7 has XSS in the system log." }, { "lang": "es", "value": "Contao versiones anteriores a 4.5.7, presenta una vulnerabilidad de tipo XSS en el registro del sistema." } ], "id": "CVE-2018-10125", "lastModified": "2024-11-21T03:40:53.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-16T15:15:11.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-11 23:15
Modified
2024-11-21 06:15
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2CE6152-30F2-4712-B4DD-08F091E9ADF9", "versionEndExcluding": "4.4.56", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "C35F4C67-BA49-46DD-A843-4D2F93B50FA3", "versionEndExcluding": "4.9.18", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F8DCD4-A7B8-4DD9-9A3C-5640D7284FF4", "versionEndExcluding": "4.11.7", "versionStartIncluding": "4.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8EB22924-9904-40AE-AD23-427B01985DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D89C4A4-3614-4C0E-A1EE-DC3166E635F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D19BB4B2-5649-4DF1-8DF8-49609647CD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F59C41A-1EC4-4B45-8A1F-FBBC90EB6FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DCF20BC-0B4A-4904-B1C9-FF72C83CB26D", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "134A6E73-9292-4F37-8D0A-088249B773BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "97184D33-21EC-4792-B40E-3C0E8972D400", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "78779300-D33E-4ACF-805F-F49B1D54DFED", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:4.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "30EBE2B6-34AC-41E0-ACAA-D3149A9A0BEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users." }, { "lang": "es", "value": "Contao es un CMS de c\u00f3digo abierto que permite crear sitios y aplicaciones web escalables. En las versiones afectadas es posible cargar archivos PHP introduciendo etiquetas de inserci\u00f3n en el back-end de Contao. Las instalaciones s\u00f3lo est\u00e1n afectadas si presentan usuarios de back end no confiables que tengan derechos para modificar los campos que se muestran en el front end. Actualice a Contao versiones 4.4.56, 4.9.18 o 4.11.7 para resolverlo. Si no puede actualizar, desactive el inicio de sesi\u00f3n para usuarios de back end no confiables" } ], "id": "CVE-2021-37626", "lastModified": "2024-11-21T06:15:33.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-11T23:15:07.750", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-28 17:15
Modified
2025-09-02 17:39
Severity ?
Summary
Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEA37692-4A35-4C0E-95C5-ABE4B9142441", "versionEndIncluding": "4.9.14", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "82752B8E-B939-4ADA-A7E5-595890EBA810", "versionEndExcluding": "4.13.56", "versionStartIncluding": "4.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F6788-0473-4C0E-8602-2B66A518B9D5", "versionEndExcluding": "5.3.38", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC84DCCC-B7C2-43DB-AFFA-F3464B640F78", "versionEndExcluding": "5.6.1", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search." } ], "id": "CVE-2025-57756", "lastModified": "2025-09-02T17:39:29.950", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-28T17:15:36.023", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-front-end-search-index" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/a03976c459b6f3985a28f6488b82a76ffb6c0514" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-2xmj-8wmq-7475" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "CWE-612" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-28 17:15
Modified
2025-09-02 17:38
Severity ?
Summary
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not adding protected news archives to the news feed page.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F26EC5-04D5-48B8-9633-63E661CE2103", "versionEndExcluding": "5.3.38", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC84DCCC-B7C2-43DB-AFFA-F3464B640F78", "versionEndExcluding": "5.6.1", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not adding protected news archives to the news feed page." } ], "id": "CVE-2025-57757", "lastModified": "2025-09-02T17:38:34.263", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-28T17:15:36.220", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-news-module" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/e75f46b11974fbf7a4652e65c19ad6ca84c59271" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-w53m-gxvg-vx7p" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "CWE-212" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-09 14:15
Modified
2025-01-16 19:54
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "302B7F92-FC7F-4E43-BEE2-7D493B03CB0C", "versionEndExcluding": "4.13.40", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "556D1F95-B80C-4819-BFC2-CF3EF735BBE6", "versionEndExcluding": "5.3.4", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users." }, { "lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.0.0 y antes de la versi\u00f3n 4.13.40 y 5.3.4, los usuarios pueden inyectar c\u00f3digo malicioso en los nombres de archivos al cargar archivos (back-end y front-end), que luego se ejecuta en informaci\u00f3n sobre herramientas y ventanas emergentes en el back-end. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, elimine los campos de carga de los formularios frontales y deshabilite las cargas para usuarios finales que no sean de confianza." } ], "id": "CVE-2024-28190", "lastModified": "2025-01-16T19:54:16.763", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-09T14:15:08.503", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-09 16:15
Modified
2025-01-17 15:42
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6D0092B-6633-4781-A177-8D962CD55916", "versionEndExcluding": "4.13.40", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "556D1F95-B80C-4819-BFC2-CF3EF735BBE6", "versionEndExcluding": "5.3.4", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages." }, { "lang": "es", "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.9.0 y antes de las versiones 4.13.40 y 5.3.4, al comprobar si hay enlaces rotos en p\u00e1ginas protegidas, Contao tambi\u00e9n env\u00eda el encabezado de la cookie a URL externas; las opciones pasadas para el cliente http se utilizan para todas las solicitudes. . Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, desactive el rastreo de p\u00e1ginas protegidas." } ], "id": "CVE-2024-28235", "lastModified": "2025-01-17T15:42:02.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-09T16:15:07.863", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-07 21:15
Modified
2024-11-21 05:18
Severity ?
Summary
Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://community.contao.org/en/forumdisplay.php?4-Announcements | Release Notes, Vendor Advisory | |
cve@mitre.org | https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.contao.org/en/forumdisplay.php?4-Announcements | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "23F9422B-6442-449E-AD0E-9C62C5FE2ED9", "versionEndExcluding": "4.4.52", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A1287C9-07C4-441C-ADD3-69C756679EF9", "versionEndExcluding": "4.9.6", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "53A6E128-ED2F-42A1-AE01-39C3F83F5190", "versionEndExcluding": "4.10.1", "versionStartIncluding": "4.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered." }, { "lang": "es", "value": "Contao versiones anteriores a 4.4.52, versiones 4.9.x anteriores a 4.9.6 y versiones 4.10.x anteriores a 4.10,1 presentan una Comprobaci\u00f3n de Entrada Inapropiada.\u0026#xa0;Es posible inyectar etiquetas de inserci\u00f3n en formularios del front end que ser\u00e1n reemplazados cuando la p\u00e1gina es renderizada" } ], "id": "CVE-2020-25768", "lastModified": "2024-11-21T05:18:43.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-07T21:15:14.963", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-28 17:15
Modified
2025-09-02 17:37
Severity ?
Summary
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn't check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not relying solely on the voter and additionally to check USER_CAN_ACCESS_MODULE.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F26EC5-04D5-48B8-9633-63E661CE2103", "versionEndExcluding": "5.3.38", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC84DCCC-B7C2-43DB-AFFA-F3464B640F78", "versionEndExcluding": "5.6.1", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn\u0027t check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involves not relying solely on the voter and additionally to check USER_CAN_ACCESS_MODULE." } ], "id": "CVE-2025-57758", "lastModified": "2025-09-02T17:37:58.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-28T17:15:36.420", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/improper-access-control-in-the-back-end-voters" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/3f05c603e1c94d34819f837f060df5d66447d0d7" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-7m47-r75r-cx8v" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-12 15:15
Modified
2024-11-21 06:12
Severity ?
Summary
Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "050530D4-3934-4F6B-B4CD-0FA871B16FBA", "versionEndExcluding": "4.4.56", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "86916B26-65B1-4557-95C9-03A62F1A3216", "versionEndExcluding": "4.9.18", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E05FE29-4CB5-47D9-935B-48A560D9E50D", "versionEndExcluding": "4.11.7", "versionStartIncluding": "4.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao \u003e=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7." }, { "lang": "es", "value": "Contao versiones posteriores a 4.0.0 incluy\u00e9ndola, permite un ataque de tipo XSS de backend por medio de atributos HTML a un campo HTML. Corregido en versiones 4.4.56, 4.9.18, 4.11.7" } ], "id": "CVE-2021-35955", "lastModified": "2024-11-21T06:12:49.763", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-12T15:15:07.960", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-28 17:15
Modified
2025-09-02 17:36
Severity ?
Summary
Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6.1. There are no workarounds.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F26EC5-04D5-48B8-9633-63E661CE2103", "versionEndExcluding": "5.3.38", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC84DCCC-B7C2-43DB-AFFA-F3464B640F78", "versionEndExcluding": "5.6.1", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6.1. There are no workarounds." } ], "id": "CVE-2025-57759", "lastModified": "2025-09-02T17:36:12.837", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-28T17:15:36.597", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://contao.org/en/security-advisories/improper-privilege-management-for-page-and-article-fields" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/contao/contao/commit/80ee7db12d55ad979d9b1b180f273d4e2668851f" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-qqfq-7cpp-hcqj" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }