Privilege escalation via form generator
Description
Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In Contao CMS, untrusted back end users with form generator access can escalate privileges, fixed in versions 4.4.56, 4.9.18, and 4.11.7.
Vulnerability
Contao CMS versions prior to 4.4.56, 4.9.18, and 4.11.7 contain a privilege escalation vulnerability in the back end. The bug is reachable when an untrusted back end user has access to the form generator component [1].
Exploitation
An attacker must be an authenticated back end user with access to the form generator. No further privileges are required. The exact exploitation steps are not detailed in the available references, but the vulnerability allows the attacker to gain higher privileges within the Contao back end [1].
Impact
Successful exploitation results in privilege escalation, allowing the attacker to obtain privileged rights in the Contao back end. This could lead to unauthorized access to sensitive data, modification of site content, or full administrative control [1].
Mitigation
The vulnerability is fixed in Contao versions 4.4.56, 4.9.18, and 4.11.7. As a workaround, administrators can disable the form generator or disable login for untrusted back end users [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
contao/core-bundlePackagist | >= 4.0.0, < 4.4.56 | 4.4.56 |
contao/core-bundlePackagist | >= 4.5.0, < 4.9.18 | 4.9.18 |
contao/core-bundlePackagist | >= 4.10.0, < 4.11.7 | 4.11.7 |
contao/contaoPackagist | >= 4.0.0, < 4.4.56 | 4.4.56 |
contao/contaoPackagist | >= 4.5.0, < 4.9.18 | 4.9.18 |
contao/contaoPackagist | >= 4.10.0, < 4.11.7 | 4.11.7 |
Affected products
3- ghsa-coords2 versions
>= 4.0.0, < 4.4.56+ 1 more
- (no CPE)range: >= 4.0.0, < 4.4.56
- (no CPE)range: >= 4.0.0, < 4.4.56
- contao/contaov5Range: < 4.4.56
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-hq5m-mqmx-fw6mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-37627ghsaADVISORY
- contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.htmlghsax_refsource_MISCWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2021-37627.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2021-37627.yamlghsaWEB
- github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.