Show filters
35 Total Results
Displaying 1-10 of 35
Sort by:
Attacker Value
Unknown
CVE-2024-45604
Disclosure Date: September 17, 2024 (last updated September 26, 2024)
Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-45398
Disclosure Date: September 17, 2024 (last updated September 26, 2024)
Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
0
Attacker Value
Unknown
CVE-2024-45612
Disclosure Date: September 17, 2024 (last updated September 24, 2024)
Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.
0
Attacker Value
Unknown
CVE-2024-30262
Disclosure Date: April 09, 2024 (last updated January 12, 2025)
Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable "Allow auto login" in the login module.
0
Attacker Value
Unknown
CVE-2024-28235
Disclosure Date: April 09, 2024 (last updated January 18, 2025)
Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages.
0
Attacker Value
Unknown
CVE-2024-28234
Disclosure Date: April 09, 2024 (last updated January 06, 2025)
Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments.
0
Attacker Value
Unknown
CVE-2024-28191
Disclosure Date: April 09, 2024 (last updated January 18, 2025)
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character.
0
Attacker Value
Unknown
CVE-2024-28190
Disclosure Date: April 09, 2024 (last updated January 17, 2025)
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
0
Attacker Value
Unknown
CVE-2018-5478
Disclosure Date: September 21, 2023 (last updated February 25, 2025)
Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension.
0
Attacker Value
Unknown
CVE-2023-36806
Disclosure Date: July 25, 2023 (last updated February 25, 2025)
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.
0