CVE-2024-45612Improper Input Validation in Contao

Severity
5.3MEDIUMNVD
EPSS
0.5%
top 31.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 17

Description

Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDcontao/contao4.13.04.13.49+2
Packagistcontao/core-bundle4.13.04.13.49+2
CVEListV5contao/contao>= 4.13.0, < 4.13.49, >= 5.0.0, < 5.3.15, >= 5.4.0, < 5.4.3+2

🔴Vulnerability Details

3
CVEList
Insert tag injection via canonical URL in Contao2024-09-17
GHSA
Contao affected by insert tag injection via canonical URL2024-09-17
OSV
Contao affected by insert tag injection via canonical URL2024-09-17
CVE-2024-45612 — Improper Input Validation in Contao | cvebase