Packagist (Composer) package
contao/core-bundle
pkg:composer/contao/core-bundle
Vulnerabilities (31)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-65961 | — | >= 4.0.0, < 4.13.57 | 4.13.57 | Nov 25, 2025 | Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, it is possible to inject code into the template output that will be executed in the browser in the front end and back end. This issue has been patched in versions 4.13.57, 5.3.42, | ||
| CVE-2025-65960 | — | >= 4.0.0, < 4.13.57 | 4.13.57 | Nov 25, 2025 | Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in | ||
| CVE-2025-57759 | — | >= 5.3.0, < 5.3.38 | 5.3.38 | Aug 28, 2025 | Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6. | ||
| CVE-2025-57758 | — | >= 5.0.0, < 5.3.38 | 5.3.38 | Aug 28, 2025 | Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn't check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involv | ||
| CVE-2025-57757 | — | >= 5.0.0-RC1, < 5.3.38 | 5.3.38 | Aug 28, 2025 | Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1. | ||
| CVE-2025-57756 | — | >= 4.9.14, < 4.13.56 | 4.13.56 | Aug 28, 2025 | Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5. | ||
| CVE-2025-29790 | — | >= 4.0.0, < 4.13.54 | 4.13.54 | Mar 18, 2025 | Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6. | ||
| CVE-2024-45604 | — | < 4.13.49 | 4.13.49 | Sep 17, 2024 | Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability. | ||
| CVE-2024-45398 | — | >= 4.0.0, < 4.13.49 | 4.13.49 | Sep 17, 2024 | Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web | ||
| CVE-2024-45612 | — | >= 4.13.0, < 4.13.49 | 4.13.49 | Sep 17, 2024 | Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonica | ||
| CVE-2024-30262 | — | < 4.13.40 | 4.13.40 | Apr 9, 2024 | Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get | ||
| CVE-2024-28235 | — | >= 4.9.0, < 4.13.40 | 4.13.40 | Apr 9, 2024 | Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for | ||
| CVE-2024-28191 | — | >= 4.0.0, < 4.13.40 | 4.13.40 | Apr 9, 2024 | Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this | ||
| CVE-2024-28190 | — | >= 4.0.0, < 4.13.40 | 4.13.40 | Apr 9, 2024 | Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao | ||
| CVE-2023-36806 | — | >= 4.0.0, < 4.9.42 | 4.9.42 | Jul 25, 2023 | Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element pr | ||
| CVE-2022-24899 | — | >= 4.13.0, < 4.13.3 | 4.13.3 | May 5, 2022 | Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settin | ||
| CVE-2021-35955 | — | >= 4.0.0, < 4.4.56 | 4.4.56 | Aug 12, 2021 | Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7. | ||
| CVE-2021-37627 | — | >= 4.0.0, < 4.4.56 | 4.4.56 | Aug 11, 2021 | Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form gen | ||
| CVE-2021-37626 | — | >= 4.0.0, < 4.4.56 | 4.4.56 | Aug 11, 2021 | Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the | ||
| CVE-2021-35210 | — | >= 4.5.0, < 4.9.16 | 4.9.16 | Jun 23, 2021 | Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end. |
- CVE-2025-65961Nov 25, 2025affected >= 4.0.0, < 4.13.57fixed 4.13.57
Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, it is possible to inject code into the template output that will be executed in the browser in the front end and back end. This issue has been patched in versions 4.13.57, 5.3.42,
- CVE-2025-65960Nov 25, 2025affected >= 4.0.0, < 4.13.57fixed 4.13.57
Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in
- CVE-2025-57759Aug 28, 2025affected >= 5.3.0, < 5.3.38fixed 5.3.38
Contao is an Open Source CMS. In versions starting from 5.3.0 and prior to 5.3.38 and 5.6.1, under certain conditions, back end users may be able to edit fields of pages and articles without having the necessary permissions. This issue has been patched in versions 5.3.38 and 5.6.
- CVE-2025-57758Aug 28, 2025affected >= 5.0.0, < 5.3.38fixed 5.3.38
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, the table access voter in the back end doesn't check if a user is allowed to access the corresponding module. This issue has been patched in versions 5.3.38 and 5.6.1. A workaround involv
- CVE-2025-57757Aug 28, 2025affected >= 5.0.0-RC1, < 5.3.38fixed 5.3.38
Contao is an Open Source CMS. In versions starting from 5.0.0 and prior to 5.3.38 and 5.6.1, if a news feed contains protected news archives, their news items are not filtered and become publicly available in the RSS feed. This issue has been patched in versions 5.3.38 and 5.6.1.
- CVE-2025-57756Aug 28, 2025affected >= 4.9.14, < 4.13.56fixed 4.13.56
Contao is an Open Source CMS. In versions starting from 4.9.14 and prior to 4.13.56, 5.3.38, and 5.6.1, protected content elements that are rendered as fragments are indexed and become publicly available in the front end search. This issue has been patched in versions 4.13.56, 5.
- CVE-2025-29790Mar 18, 2025affected >= 4.0.0, < 4.13.54fixed 4.13.54
Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6.
- CVE-2024-45604Sep 17, 2024affected < 4.13.49fixed 4.13.49
Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability.
- CVE-2024-45398Sep 17, 2024affected >= 4.0.0, < 4.13.49fixed 4.13.49
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web
- CVE-2024-45612Sep 17, 2024affected >= 4.13.0, < 4.13.49fixed 4.13.49
Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonica
- CVE-2024-30262Apr 9, 2024affected < 4.13.40fixed 4.13.40
Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get
- CVE-2024-28235Apr 9, 2024affected >= 4.9.0, < 4.13.40fixed 4.13.40
Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for
- CVE-2024-28191Apr 9, 2024affected >= 4.0.0, < 4.13.40fixed 4.13.40
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this
- CVE-2024-28190Apr 9, 2024affected >= 4.0.0, < 4.13.40fixed 4.13.40
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao
- CVE-2023-36806Jul 25, 2023affected >= 4.0.0, < 4.9.42fixed 4.9.42
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element pr
- CVE-2022-24899May 5, 2022affected >= 4.13.0, < 4.13.3fixed 4.13.3
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settin
- CVE-2021-35955Aug 12, 2021affected >= 4.0.0, < 4.4.56fixed 4.4.56
Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7.
- CVE-2021-37627Aug 11, 2021affected >= 4.0.0, < 4.4.56fixed 4.4.56
Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form gen
- CVE-2021-37626Aug 11, 2021affected >= 4.0.0, < 4.4.56fixed 4.4.56
Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the
- CVE-2021-35210Jun 23, 2021affected >= 4.5.0, < 4.9.16fixed 4.9.16
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
Page 1 of 2