CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
30.9%
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.
[
{
"vendor": "contao",
"product": "contao",
"versions": [
{
"version": ">= 4.0.0, < 4.9.42",
"status": "affected"
},
{
"version": ">= 4.10.0, < 4.13.28",
"status": "affected"
},
{
"version": ">= 5.0.0, < 5.1.10",
"status": "affected"
}
]
}
]
github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4
github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b
github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32
github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x
herolab.usd.de/security-advisories/usd-2023-0020/