FKIE_CVE-2025-57756
Vulnerability from fkie_nvd - Published: 2025-08-28 17:15 - Updated: 2025-09-02 17:39
Severity ?
Summary
Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA37692-4A35-4C0E-95C5-ABE4B9142441",
"versionEndIncluding": "4.9.14",
"versionStartIncluding": "4.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82752B8E-B939-4ADA-A7E5-595890EBA810",
"versionEndExcluding": "4.13.56",
"versionStartIncluding": "4.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3F6788-0473-4C0E-8602-2B66A518B9D5",
"versionEndExcluding": "5.3.38",
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC84DCCC-B7C2-43DB-AFFA-F3464B640F78",
"versionEndExcluding": "5.6.1",
"versionStartIncluding": "5.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.3.38, and 5.6.1. A workaround involves disabling the front end search."
},
{
"lang": "es",
"value": "Contao es un CMS de c\u00f3digo abierto. En versiones a partir de la 4.9.14 y anteriores a la 4.13.56, 5.3.38 y 5.6.1, los elementos de contenido protegidos que se renderizan como fragmentos se indexan y se vuelven p\u00fablicamente disponibles en la b\u00fasqueda del *front end*. Este problema ha sido parcheado en las versiones 4.13.56, 5.3.38 y 5.6.1. Una soluci\u00f3n alternativa implica deshabilitar la b\u00fasqueda del *front end*."
}
],
"id": "CVE-2025-57756",
"lastModified": "2025-09-02T17:39:29.950",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-08-28T17:15:36.023",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://contao.org/en/security-advisories/information-disclosure-in-the-front-end-search-index"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/contao/contao/commit/a03976c459b6f3985a28f6488b82a76ffb6c0514"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/contao/contao/security/advisories/GHSA-2xmj-8wmq-7475"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-612"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…