VYPR
Moderate severityNVD Advisory· Published Aug 11, 2021· Updated Aug 4, 2024

PHP file inclusion via insert tags

CVE-2021-37626

Description

Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Contao, untrusted back end users can load PHP files via insert tags in front-end fields, leading to code execution.

Vulnerability

In Contao versions prior to 4.4.56, 4.9.18, and 4.11.7, a vulnerability exists in the handling of insert tags. An attacker with untrusted back end user privileges can load PHP files by entering malicious insert tags in fields that are displayed in the front end [1].

Exploitation

To exploit, an attacker must be an untrusted back end user with permissions to modify fields that are rendered in the front end. By crafting an insert tag containing a PHP file path, the application loads and executes the file. The exact mechanism requires knowledge of the insert tag syntax but no additional authentication beyond the user's existing privileges [1].

Impact

Successful exploitation allows arbitrary PHP file loading and execution, leading to remote code execution with the web application's privileges. This can result in full compromise of the CMS, including data exposure, modification, or further attacks [1].

Mitigation

Update to Contao 4.4.56, 4.9.18, or 4.11.7, which contain the fix [1][3][4]. If immediate update is not possible, disable login for untrusted back end users as a workaround [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
contao/core-bundlePackagist
>= 4.0.0, < 4.4.564.4.56
contao/core-bundlePackagist
>= 4.5.0, < 4.9.184.9.18
contao/core-bundlePackagist
>= 4.10.0, < 4.11.74.11.7
contao/contaoPackagist
>= 4.0.0, < 4.4.564.4.56
contao/contaoPackagist
>= 4.5.0, < 4.9.184.9.18
contao/contaoPackagist
>= 4.10.0, < 4.11.74.11.7

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.