CVE-2025-29790 – contao/core-bundle
Package
Manager: composer
Name: contao/core-bundle
Vulnerable Version: >=4.0.0 <4.13.54 || >=5.3.0 <5.3.30 || >=5.4.0 <5.5.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:H/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.0014 pctl0.34772
Details
Contao Vulnerable to Cross-Site Scripting (XSS) through SVG uploads ### Impact Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. ### Patches Update to Contao 4.13.54, 5.3.30 or 5.5.6. ### Workarounds Remove `svg,svgz` from the allowed upload file types in the system settings and from `contao.editable_files` in the `config.yaml`. ### References https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
Metadata
Created: 2025-03-18T21:07:17Z
Modified: 2025-04-17T12:44:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-vqqr-fgmh-f626/GHSA-vqqr-fgmh-f626.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-vqqr-fgmh-f626
Finding: F425
Auto approve: 1