Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in versions 4.13.57, 5.3.42, and 5.6.5. A workaround for this issue involves manually patching the Contao\Template::once() method.
History

Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Contao
Contao contao
Vendors & Products Contao
Contao contao

Tue, 25 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 19:00:00 +0000

Type Values Removed Values Added
Description Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in versions 4.13.57, 5.3.42, and 5.6.5. A workaround for this issue involves manually patching the Contao\Template::once() method.
Title Contao is vulnerable to remote code execution in template closures
Weaknesses CWE-351
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-25T18:54:48.897Z

Updated: 2025-11-25T20:00:14.687Z

Reserved: 2025-11-18T16:14:56.694Z

Link: CVE-2025-65960

cve-icon Vulnrichment

Updated: 2025-11-25T20:00:06.559Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-25T19:15:51.203

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-65960

cve-icon Redhat

No data.