Back end users with access to the file manager can upload malicious files and execute them on the server.
Update to Contao 4.13.49, 5.3.15 or 5.4.3.
Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.
https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads
If you have any questions or comments about this advisory, open an issue in contao/contao.
Thanks to Jakob Steeg from usd AG for reporting this vulnerability.
{ "nvd_published_at": "2024-09-17T20:15:04Z", "cwe_ids": [ "CWE-434" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-09-17T14:58:35Z" }