CVE-2021-37626Code Injection in Contao

CWE-94Code Injection4 documents4 sources
Severity
7.2HIGHNVD
EPSS
0.5%
top 34.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 11
Latest updateAug 23

Description

Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages4 packages

NVDcontao/contao4.4.04.4.56+11
Packagistcontao/contao4.0.04.4.56+2
Packagistcontao/core-bundle4.0.04.4.56+2
CVEListV5contao/contao>= 4.0.0, < 4.4.56, >= 4.10.0, < 4.11.7, >= 4.5.0, < 4.9.18+2

🔴Vulnerability Details

3
GHSA
PHP file inclusion via insert tags2021-08-23
OSV
PHP file inclusion via insert tags2021-08-23
CVEList
PHP file inclusion via insert tags2021-08-11
CVE-2021-37626 — Code Injection in Contao | cvebase