Description
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5
Vendor Advisory x_refsource_misc
https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads
Scores
CVSS v3
8.3
EPSS
0.0021
EPSS Percentile
43.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (2)
contao/contao
4.0.0 - 4.13.49
contao/core-bundle
4.0.0 - 4.13.49Packagist
Published
Sep 17, 2024
Tracked Since
Feb 18, 2026