Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-98vj-mm79-v77r

Опубликовано: 25 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.6

Описание

Contao is vulnerable to remote code execution in template closures

Impact

Backend users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters.

Patches

Update to Contao 4.13.57, 5.3.42 or 5.6.5

Workarounds

Manually patch the Contao\Template::once() method.

Resources

https://contao.org/en/security-advisories/remote-code-execution-in-template-closures

Пакеты

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 4.0.0, < 4.13.57

4.13.57

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.0.0-RC1, < 5.3.42

5.3.42

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.4.0-RC1, < 5.6.5

5.6.5

EPSS

Процентиль: 6%
0.00024
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-351

Связанные уязвимости

CVSS3: 6.6
nvd
2 месяца назад

Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in versions 4.13.57, 5.3.42, and 5.6.5. A workaround for this issue involves manually patching the Contao\Template::once() method.

EPSS

Процентиль: 6%
0.00024
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-351