PHP file inclusion via insert tags
Description
Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In Contao, untrusted back end users can load PHP files via insert tags in front-end fields, leading to code execution.
Vulnerability
In Contao versions prior to 4.4.56, 4.9.18, and 4.11.7, a vulnerability exists in the handling of insert tags. An attacker with untrusted back end user privileges can load PHP files by entering malicious insert tags in fields that are displayed in the front end [1].
Exploitation
To exploit, an attacker must be an untrusted back end user with permissions to modify fields that are rendered in the front end. By crafting an insert tag containing a PHP file path, the application loads and executes the file. The exact mechanism requires knowledge of the insert tag syntax but no additional authentication beyond the user's existing privileges [1].
Impact
Successful exploitation allows arbitrary PHP file loading and execution, leading to remote code execution with the web application's privileges. This can result in full compromise of the CMS, including data exposure, modification, or further attacks [1].
Mitigation
Update to Contao 4.4.56, 4.9.18, or 4.11.7, which contain the fix [1][3][4]. If immediate update is not possible, disable login for untrusted back end users as a workaround [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
contao/core-bundlePackagist | >= 4.0.0, < 4.4.56 | 4.4.56 |
contao/core-bundlePackagist | >= 4.5.0, < 4.9.18 | 4.9.18 |
contao/core-bundlePackagist | >= 4.10.0, < 4.11.7 | 4.11.7 |
contao/contaoPackagist | >= 4.0.0, < 4.4.56 | 4.4.56 |
contao/contaoPackagist | >= 4.5.0, < 4.9.18 | 4.9.18 |
contao/contaoPackagist | >= 4.10.0, < 4.11.7 | 4.11.7 |
Affected products
3- ghsa-coords2 versions
>= 4.0.0, < 4.4.56+ 1 more
- (no CPE)range: >= 4.0.0, < 4.4.56
- (no CPE)range: >= 4.0.0, < 4.4.56
- contao/contaov5Range: >= 4.0.0, < 4.4.56
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-r6mv-ppjc-4hgrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-37626ghsaADVISORY
- contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.htmlghsax_refsource_MISCWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2021-37626.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2021-37626.yamlghsaWEB
- github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgrghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.