Description
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.
References (5)
Core 5
Core References
Exploit, Third Party Advisory
https://herolab.usd.de/security-advisories/usd-2023-0020/
Vendor Advisory x_refsource_confirm
https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x
Patch x_refsource_misc
https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4
Patch x_refsource_misc
https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b
Patch x_refsource_misc
https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32
Scores
CVSS v3
6.5
EPSS
0.0024
EPSS Percentile
47.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
contao/contao
4.0.0 - 4.9.42
contao/core-bundle
4.0.0 - 4.9.42Packagist
Published
Jul 25, 2023
Tracked Since
Feb 18, 2026