CVE-2021-37626

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-37626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-37626
Aliases
Published
2021-08-11T23:15:07Z
Modified
2024-05-29T22:12:27Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.

References

Affected packages

Git / github.com/contao/contao

Affected ranges

Type
GIT
Repo
https://github.com/contao/contao
Events