CVE-2025-30166 – pimcore/admin-ui-classic-bundle
Package
Manager: composer
Name: pimcore/admin-ui-classic-bundle
Vulnerable Version: >=0 <1.7.6
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:H/RL:U/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 1e-05 pctl7e-05
Details
Pimcore's Admin Classic Bundle allows HTML Injection ### Summary An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into emails sent via the admin interface, potentially leading to session cookie theft and the alteration of page content. ### Details The vulnerability was discovered in the `/admin/email/send-test-email` endpoint using the `POST` method. The vulnerable parameter is `content`, which permits the injection of arbitrary HTML code during the email sending process. While JavaScript code injection is blocked through filtering, HTML code injection remains possible. ### PoC To reproduce the vulnerability, a user must fill out the email's content form with the desired HTML payload.  ### Impact  This HTML injection vulnerability can potentially enable phishing attacks by allowing the insertion of any html like fake login forms, etc. All functionalities that process user input should be carefully reviewed to ensure that data is appropriately encoded as HTML entities in server responses. For instance, a reflected input paramete like `<h1> just a test </h1> <p> <img>` should be displayed in the HTML response as `<h1> just a test </h1> <p> <img>`.
Metadata
Created: 2025-04-08T14:51:41Z
Modified: 2025-04-08T14:51:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-x82r-6j37-vrgg/GHSA-x82r-6j37-vrgg.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-x82r-6j37-vrgg
Finding: F425
Auto approve: 1