CVE-2025-30166:
Pimcore's Admin Classic Bundle allows HTML Injection
1.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pimcore/admin-ui-classic-bundle | composer | < 1.7.6 | 1.7.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the email sending functionality, specifically when handling the 'content' parameter. The provided commit 76b690d4f8fcd9c9d41766bc5238c2513242e60e
directly modifies the sendTestEmailAction
method within src/Controller/Admin/EmailController.php
. The patch applies strip_tags
to the content
parameter when the email type is 'text', indicating that previously this input was not sanitized. The diff clearly shows the vulnerable line - $mail->text($request->get('content'));
being replaced. This function is responsible for retrieving the user input and passing it to the mail generation logic. The vulnerability description also implies that the HTML email type path within the same function might still be vulnerable as it wasn't addressed by this specific commit. Therefore, sendTestEmailAction
is identified as the vulnerable function as it processes the tainted input.