logo

CVE-2024-28190 contao/core-bundle

Package

Manager: composer
Name: contao/core-bundle
Vulnerable Version: >=4.0.0 <4.13.40 || >=5.0.0-rc1 <5.3.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01037 pctl0.76553

Details

Contao: Cross site scripting in the file manager ### Impact Users can insert malicious code into file names when uploading files, which is then executed in tooltips and popups in the backend. ### Patches Update to Contao 4.13.40 or Contao 5.3.4. ### Workarounds Disable uploads for untrusted users. ### References https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). ### Credits Thanks to Alexander Wuttke for reporting this vulnerability.

Metadata

Created: 2024-04-09T18:52:46Z
Modified: 2025-04-17T12:44:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-v24p-7p4j-qvvf/GHSA-v24p-7p4j-qvvf.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-v24p-7p4j-qvvf
Finding: F425
Auto approve: 1