We found results for “”
CVE-2025-65960
Good to know:
Date: November 25, 2025
Contao is an Open Source CMS. From version 4.0.0 to before 4.13.57, before 5.3.42, and before 5.6.5, back end users with precise control over the contents of template closures can execute arbitrary PHP functions that do not have required parameters. This issue has been patched in versions 4.13.57, 5.3.42, and 5.6.5. A workaround for this issue involves manually patching the Contao\Template::once() method.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Insufficient Type Distinction
CWE-351Top Fix
Upgrade Version
Upgrade to version contao/core-bundle - 4.13.57;contao/core-bundle - 5.3.42;contao/core-bundle - 5.6.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


