Miggo Logo

CVE-2025-30166:
Pimcore's Admin Classic Bundle allows HTML Injection

1.8

CVSS Score
4.0

Basic Information

EPSS Score
0.00021%
Published
4/8/2025
Updated
4/8/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package NameEcosystemVulnerable VersionsFirst Patched Version
pimcore/admin-ui-classic-bundlecomposer< 1.7.61.7.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in the email sending functionality, specifically when handling the 'content' parameter. The provided commit 76b690d4f8fcd9c9d41766bc5238c2513242e60e directly modifies the sendTestEmailAction method within src/Controller/Admin/EmailController.php. The patch applies strip_tags to the content parameter when the email type is 'text', indicating that previously this input was not sanitized. The diff clearly shows the vulnerable line - $mail->text($request->get('content')); being replaced. This function is responsible for retrieving the user input and passing it to the mail generation logic. The vulnerability description also implies that the HTML email type path within the same function might still be vulnerable as it wasn't addressed by this specific commit. Therefore, sendTestEmailAction is identified as the vulnerable function as it processes the tainted input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *n *TML inj**tion issu* *llows us*rs wit* ****ss to t** *m*il s*n*in* *un*tion*lity to inj**t *r*itr*ry *TML *o** into *m*ils s*nt vi* t** **min int*r****, pot*nti*lly l***in* to s*ssion *ooki* t***t *n* t** *lt*r*tion o* p*** *ont*nt. #

Reasoning

T** vuln*r**ility o**urs in t** *m*il s*n*in* *un*tion*lity, sp**i*i**lly w**n **n*lin* t** '*ont*nt' p*r*m*t*r. T** provi*** *ommit `****************************************` *ir**tly mo*i*i*s t** `s*n*T*st*m*il**tion` m*t*o* wit*in `sr*/*ontroll*r/