Description
Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1304 | Contao: Cross site scripting in the file manager |
Github GHSA |
GHSA-v24p-7p4j-qvvf | Contao: Cross site scripting in the file manager |
References
History
Thu, 16 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Contao
Contao contao |
|
| CPEs | cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Contao
Contao contao |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:48:49.506Z
Reserved: 2024-03-06T17:35:00.859Z
Link: CVE-2024-28190
Updated: 2024-05-23T17:24:03.155Z
Status : Analyzed
Published: 2024-04-09T14:15:08.503
Modified: 2025-01-16T19:54:16.763
Link: CVE-2024-28190
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA