We found results for “”
CVE-2026-23493
Good to know:
Date: January 15, 2026
Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, and other details can be accessed or recovered through the Pimcore backend. This vulnerability is fixed in 12.3.1 and 11.5.14.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Insertion of Sensitive Information into Log File
CWE-532Top Fix
Upgrade Version
Upgrade to version https://github.com/pimcore/pimcore.git - v12.3.1;https://github.com/pimcore/pimcore.git - v11.5.14
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | LOW |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


