{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-65960","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-18T16:14:56.694Z","datePublished":"2025-11-25T18:54:48.897Z","dateUpdated":"2025-11-25T20:00:14.687Z"},"containers":{"cna":{"title":"Contao is vulnerable to remote code execution in template closures","problemTypes":[{"descriptions":[{"cweId":"CWE-351","lang":"en","description":"CWE-351: Insufficient Type Distinction","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/contao/contao/security/advisories/GHSA-98vj-mm79-v77r","tags":["x_refsource_CONFIRM"],"url":"https://github.com/contao/contao/security/advisories/GHSA-98vj-mm79-v77r"},{"name":"https://contao.org/en/security-advisories/remote-code-execution-in-template-closures","tags":["x_refsource_MISC"],"url":"https://contao.org/en/security-advisories/remote-code-execution-in-template-closures"}],"affected":[{"vendor":"contao","product":"contao","versions":[{"version":">= 4.0.0, < 4.13.57","status":"affected"},{"version":">= 5.0.0-RC1, < 5.3.42","status":"affected"},{"version":">= 5.4.0-RC1, < 5.6.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-25T18:54:48.897Z"},"descriptions":[{"lang":"en","value":"Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in versions 4.13.57, 5.3.42, and 5.6.5. A workaround for this issue involves manually patching the Contao\\Template::once() method."}],"source":{"advisory":"GHSA-98vj-mm79-v77r","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-25T19:59:53.302405Z","id":"CVE-2025-65960","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-25T20:00:14.687Z"}}]}}