Pimcore
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Pimcore product.
RSS Feeds for Pimcore security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Pimcore products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Pimcore Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 6 vulnerabilities in Pimcore with an average score of 6.3 out of ten. Last year, in 2025 Pimcore had 5 security vulnerabilities published. That is, 1 more vulnerability have already been reported in 2026 as compared to last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 2.73.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 6.28 |
| 2025 | 5 | 3.55 |
| 2024 | 12 | 7.05 |
| 2023 | 70 | 6.20 |
| 2022 | 31 | 6.02 |
| 2021 | 11 | 6.59 |
| 2020 | 2 | 6.50 |
| 2019 | 9 | 8.23 |
| 2018 | 3 | 0.00 |
It may take a day or so for new Pimcore vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pimcore Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-27461 | Feb 24, 2026 |
SQLi via RLIKE in Pimcore 11.5.14.1-12.3.2 Query FilterPimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch. |
|
| CVE-2026-23496 | Jan 15, 2026 |
Pimcore Web2Print Auth Bypass Before 5.2.2/6.1.1Pimcore Web2Print Tools Bundle adds tools for web-to-print use cases to Pimcore. Prior to 5.2.2 and 6.1.1, the application fails to enforce proper server-side authorization checks on the API endpoint responsible for managing "Favourite Output Channel Configurations." Testing revealed that an authenticated backend user without explicitely lacking permissions for this feature was still able to successfully invoke the endpoint and modify or retrieve these configurations. This vulnerability is fixed in 5.2.2 and 6.1.1. |
|
| CVE-2026-23494 | Jan 15, 2026 |
Pimcore API Static Routes Auth Bypass Before 12.3.1/11.5.14Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the application fails to enforce proper server-side authorization checks on the API endpoint responsible for reading or listing static routes. In Pimcore, static routes are custom URL patterns defined via the backend interface or the var/config/staticroutes.php file, including details like regex-based patterns, controllers, variables, and priorities. These routes are registered automatically through the PimcoreStaticRoutesBundle and integrated into the MVC routing system. Testing revealed that an authenticated backend user lacking explicit permissions was able to invoke the endpoint (e.g., GET /api/static-routes) and retrieve sensitive route configurations. This vulnerability is fixed in 12.3.1 and 11.5.14. |
|
| CVE-2026-23495 | Jan 15, 2026 |
Pimcore Admin Classic Bundle Prv Escal by Property-List API <2.2.3/1.7.16Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. Prior to 2.2.3 and 1.7.16, the API endpoint for listing Predefined Properties in the Pimcore platform lacks adequate server-side authorization checks. Predefined Properties are configurable metadata definitions (e.g., name, key, type, default value) used across documents, assets, and objects to standardize custom attributes and improve editorial workflows, as documented in Pimcore's official properties guide. Testing confirmed that an authenticated backend user without explicit permissions for property management could successfully call the endpoint and retrieve the complete list of these configurations. The vulnerability is fixed in 2.2.3 and 1.7.16. |
|
| CVE-2026-23493 | Jan 15, 2026 |
Pimcore HTTP Error Log Exposes Sensitive Data (v<12.3.1/11.5.14)Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, and other details can be accessed or recovered through the Pimcore backend. This vulnerability is fixed in 12.3.1 and 11.5.14. |
|
| CVE-2026-23492 | Jan 14, 2026 |
Pimcore <12.3.1/11.5.14: Admin Search Find API blind SQLi for Auth.Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, an incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (--) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL payloads that do not rely on comments and infer database information via blind techniques. This vulnerability affects the admin interface and can lead to database information disclosure. This vulnerability is fixed in 12.3.1 and 11.5.14. |
|
| CVE-2025-30166 | Apr 08, 2025 |
Pimcore 1.7.5&earlier Admin Classic Bundle HTML injection via /admin/email/send-test-emailPimcore's Admin Classic Bundle provides a Backend UI for Pimcore. An HTML injection issue allows users with access to the email sending functionality to inject arbitrary HTML code into emails sent via the admin interface, potentially leading to session cookie theft and the alteration of page content. The vulnerability was discovered in the /admin/email/send-test-email endpoint using the POST method. The vulnerable parameter is content, which permits the injection of arbitrary HTML code during the email sending process. While JavaScript code injection is blocked through filtering, HTML code injection remains possible. This vulnerability is fixed in 1.7.6. |
|
| CVE-2025-27617 | Mar 11, 2025 |
Pimcore <11.5.4 SQLi via Authenticated Filter StringPimcore is an open source data and experience management platform. Prior to version 11.5.4, authenticated users can craft a filter string used to cause a SQL injection. Version 11.5.4 fixes the issue. |
|
| CVE-2025-24980 | Feb 07, 2025 |
Pimcore Admin UI Classic Bundle: User enum via Forgot pwd before 1.7.4pimcore/admin-ui-classic-bundle provides a Backend UI for Pimcore. In affected versions an error message discloses existing accounts and leads to user enumeration on the target via "Forgot password" function. No generic error message has been implemented. This issue has been addressed in version 1.7.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
|
| CVE-2024-11954 | Jan 28, 2025 |
Pimcore 11.4.2 Search Document XSS RemoteA vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
|
| CVE-2024-11956 | Jan 28, 2025 |
Critical SQLi in Pimcore CDF 4.2.0 (filterDefinition) fixed in 4.2.1A vulnerability, which was classified as critical, has been found in Pimcore customer-data-framework up to 4.2.0. Affected by this issue is some unknown functionality of the file /admin/customermanagementframework/customers/list. The manipulation of the argument filterDefinition/filter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. |
|
| CVE-2023-2332 | Nov 15, 2024 |
Pimcore 10.5.19 XSS in Pricing Rules Conditions Tab (To/From Date)A stored Cross-site Scripting (XSS) vulnerability exists in the Conditions tab of Pricing Rules in pimcore/pimcore versions 10.5.19. The vulnerability is present in the From and To fields of the Date Range section, allowing an attacker to inject malicious scripts. This can lead to the execution of arbitrary JavaScript code in the context of the user's browser, potentially stealing cookies or redirecting users to malicious sites. The issue is fixed in version 10.5.21. |
|
| CVE-2024-49370 | Oct 23, 2024 |
Pimcore portal engine 4.1.6 Password stored as cleartext via PortalUserObjectPimcore is an open source data and experience management platform. When a PortalUserObject is connected to a PimcoreUser and "Use Pimcore Backend Password" is set to true, the change password function in Portal Profile sets the new password. Prior to Pimcore portal engine versions 4.1.7 and 3.1.16, the password is then set without hashing so it can be read by everyone. Everyone who combines PortalUser to PimcoreUsers and change passwords via profile settings could be affected. Versions 4.1.7 and 3.1.16 of the Pimcore portal engine fix the issue. |
|
| CVE-2024-41109 | Jul 30, 2024 |
Pimcore Admin Classic Bundle Info Leak Exposed < 1.5.2,1.4.6,1.3.10Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system. This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10. |
|
| CVE-2024-32871 | Jun 04, 2024 |
Pimcore Thumbnails: Large File Generation Flooding (fixed in 11.2.4)Pimcore is an Open Source Data & Experience Management Platform. The Pimcore thumbnail generation can be used to flood the server with large files. By changing the file extension or scaling factor of the requested thumbnail, attackers can create files that are much larger in file size than the original. This vulnerability is fixed in 11.2.4. |
|
| CVE-2024-29197 | Mar 26, 2024 |
Pimcore <11.2.2/11.1.6.1: Unauth Preview Access via '?pimcore_preview=true'Pimcore is an Open Source Data & Experience Management Platform. Any call with the query argument `?pimcore_preview=true` allows to view unpublished sites. In previous versions of Pimcore, session information would propagate to previews, so only a logged in user could open a preview. This no longer applies. Previews are broad open to any user and with just the hint of a restricted link one could gain access to possible confident / unreleased information. This vulnerability is fixed in 11.2.2 and 11.1.6.1. |
|
| CVE-2024-25625 | Feb 19, 2024 |
Pimcore Admin Classic Bundle v<1.3.4 Host Header Injection in UserController for phishingPimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent. |
|
| CVE-2024-24822 | Feb 07, 2024 |
Pimcore PHP ACL Bug: Tag Manipulation Without Permission (v<1.3.3)Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Prior to version 1.3.3, an attacker can create, delete etc. tags without having the permission to do so. A fix is available in version 1.3.3. As a workaround, one may apply the patch manually. |
|
| CVE-2024-23646 | Jan 24, 2024 |
SQLi in Pimcore Admin Classic Bundle <1.3.2Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue. |
|
| CVE-2024-23648 | Jan 24, 2024 |
Pimcore Admin Bundle 1.2.3 Fixes Host Header URL Token Theft (CVE-2024-23648)Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password. The URL sent contains a unique token, valid during 24 hours, allowing the user to reset its password. This token is highly sensitive ; as an attacker able to retrieve it would be able to resets the user's password. Prior to version 1.2.3, the reset-password URL is crafted using the "Host" HTTP header of the request sent to request a password reset. This way, an external attacker could send password requests for users, but specify a "Host" header of a website that they control. If the user receiving the mail clicks on the link, the attacker would retrieve the reset token of the victim and perform account takeover. Version 1.2.3 fixes this issue. |
|
| CVE-2024-21666 | Jan 11, 2024 |
Auth Bypass PII Leak in Pimcore CMF <4.0.6 via /admin/.../duplicates/listThe Customer Management Framework (CMF) for Pimcore adds functionality for customer data management, segmentation, personalization and marketing automation. An authenticated and unauthorized user can access the list of potential duplicate users and see their data. Permissions are enforced when reaching the `/admin/customermanagementframework/duplicates/list` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. Unauthorized user(s) can access PII data from customers. This vulnerability has been patched in version 4.0.6. |
|
| CVE-2024-21667 | Jan 11, 2024 |
PII Leakage via /admin/customermanagementframework/gdpr-data/search in Pimcore CMF 4.0.6beforepimcore/customer-data-framework is the Customer Management Framework for management of customer data within Pimcore. An authenticated and unauthorized user can access the GDPR data extraction feature and query over the information returned, leading to customer data exposure. Permissions are not enforced when reaching the `/admin/customermanagementframework/gdpr-data/search-data-objects` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. An unauthorized user can access PII data from customers. This vulnerability has been patched in version 4.0.6. |
|
| CVE-2024-21665 | Jan 11, 2024 |
Unauthenticated Order Info Exposure in Pimcore E-Com Framework Bundle <1.0.10ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. An authenticated and unauthorized user can access the back-office orders list and be able to query over the information returned. Access control and permissions are not being enforced. This vulnerability has been patched in version 1.0.10. |
|
| CVE-2023-49076 | Nov 30, 2023 |
Pimcore 4 CSRF in Customer-Data-Framework before 4.0.5Customer-data-framework allows management of customer data within Pimcore. There are no tokens or headers to prevent CSRF attacks from occurring, therefore an attacker could abuse this vulnerability to create new customers. This issue has been patched in version 4.0.5. |
|
| CVE-2023-49075 | Nov 28, 2023 |
Pimcore Admin Classic Bundle <=1.2.1 Bypass TFA for non-admin usersThe Admin Classic Bundle provides a Backend UI for Pimcore. `AdminBundle\Security\PimcoreUserTwoFactorCondition` introduced in v11 disable the two factor authentication for all non-admin security firewalls. An authenticated user can access the system without having to provide the two factor credentials. This issue has been patched in version 1.2.2. |
|
| CVE-2023-47636 | Nov 15, 2023 |
Pimcore Admin Classic Bundle <1.2.1: Full Path Disclosure via fopenThe Pimcore Admin Classic Bundle provides a Backend UI for Pimcore. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path "fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)". This issue has been patched in commit `10d178ef771` which has been included in release version 1.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
|
| CVE-2023-47637 | Nov 15, 2023 |
Pimcore /admin/object/grid-proxy SQL Injection before v11.1.1 (priv-escalation)Pimcore is an Open Source Data & Experience Management Platform. In affected versions the `/admin/object/grid-proxy` endpoint calls `getFilterCondition()` on fields of classes to be filtered for, passing input from the request, and later executes the returned SQL. One implementation of `getFilterCondition()` is in `Multiselect`, which does not normalize/escape/validate the passed value. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. This vulnerability has been addressed in version 11.1.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
|
| CVE-2023-46722 | Oct 31, 2023 |
Pimcore Admin Classic Bundle XSS < 1.2.0: Cookie Theft & Unauthorized AccessThe Pimcore Admin Classic Bundle provides a backend UI for Pimcore. Prior to version 1.2.0, a cross-site scripting vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 1.2.0 to receive a patch or, as a workaround, apply the patch manually. |
|
| CVE-2023-5873 | Oct 31, 2023 |
Pimcore XSS stored in GitRepo prior 11.1.0Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 11.1.0. |
|
| CVE-2023-5844 | Oct 30, 2023 |
Unverified Password Change Pimcore Admin UI Classic Bundle <1.2.0Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0. |
|
| CVE-2023-5192 | Sep 27, 2023 |
Pimcore <10.3.0 Excessive Data Query Ops VulnerabilityExcessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0. |
|
| CVE-2023-42817 | Sep 25, 2023 |
Pimcore 1.1.2 admin-ui-classic-bundle sprintf parsing in translation '%s'Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including %s (from %suggest%) is parsed by sprintf() even though its supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain modules) and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit `abd77392` which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually. |
|
| CVE-2023-4453 | Aug 21, 2023 |
Pimcore Reflected XSS in Core before 10.6.8Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.6.8. |
|
| CVE-2023-38708 | Aug 04, 2023 |
Pimcore AssetController Path Traversal Enables File Overwrite (CVE-2023-38708)Pimcore is an Open Source Data & Experience Management Platform: PIM, MDM, CDP, DAM, DXP/CMS & Digital Commerce. A path traversal vulnerability exists in the `AssetController::importServerFilesAction`, which allows an attacker to overwrite or modify sensitive files by manipulating the pimcore_log parameter.This can lead to potential denial of service---key file overwrite. The impact of this vulnerability allows attackers to: overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information. This could also cause a denial of service (DoS) if critical system files are overwritten or deleted. |
|
| CVE-2023-4145 | Aug 03, 2023 |
XSS in PIMCORE Customer Data Framework before 3.4.2Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/customer-data-framework prior to 3.4.2. |
|
| CVE-2023-3819 | Jul 21, 2023 |
Pimcore <10.6.4: Sensitive Data Disclosure (CVE-2023-3819)Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pimcore/pimcore prior to 10.6.4. |
|
| CVE-2023-3822 | Jul 21, 2023 |
Pimcore XSS before v10.6.4Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.6.4. |
|
| CVE-2023-3821 | Jul 21, 2023 |
Pimcore Stored XSS in repo before 10.6.4Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.6.4. |
|
| CVE-2023-3820 | Jul 21, 2023 |
SQL Injection in Pimcore <10.6.4 (CVE-2023-3820)SQL Injection in GitHub repository pimcore/pimcore prior to 10.6.4. |
|
| CVE-2023-3673 | Jul 14, 2023 |
SQLI in Pimcore<p<10.5.24 (pimcore/pimcore)SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.24. |
|
| CVE-2023-37280 | Jul 11, 2023 |
Pimcore Admin Classic Bundle <=1.0.3: XSS via ExtJS UI without 2FAPimcore Admin Classic Bundle provides a Backend UI for Pimcore based on the ExtJS framework. An admin who has not setup two factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts/HTML content. This vulnerability has been patched in version 1.0.3. |
|
| CVE-2023-3574 | Jul 10, 2023 |
Improper Authorization Pimcore Customer Data Framework <3.4.1Improper Authorization in GitHub repository pimcore/customer-data-framework prior to 3.4.1. |
|
| CVE-2023-2984 | May 30, 2023 |
Pimcore <10.5.22 Path Traversal via '\..\filename' in repositoryPath Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22. |
|
| CVE-2023-2983 | May 30, 2023 |
Pimcore <10.5.23: Privilege Escalation via Unsafe ActionsPrivilege Defined With Unsafe Actions in GitHub repository pimcore/pimcore prior to 10.5.23. |
|
| CVE-2023-2881 | May 25, 2023 |
Pimcore Customer Data Framework passwords stored recoverable before 3.3.10Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10. |
|
| CVE-2023-2756 | May 17, 2023 |
SQLi in Pimcore CDF <3.3.10SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10. |
|
| CVE-2023-2730 | May 16, 2023 |
Pimcore XSS Stored Prior to v10.3.3Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3. |
|
| CVE-2023-32075 | May 11, 2023 |
Pimcore CMF: Counter Logic Error in Conditions Tab Fix 3.3.9The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management. In `pimcore/customer-management-framework-bundle` prior to version 3.3.9, business logic errors are possible in the `Conditions` tab since the counter can be a negative number. This vulnerability is capable of the unlogic in the counter value in the Conditions tab. Users should update to version 3.3.9 to receive a patch or, as a workaround, or apply the patch manually. |
|
| CVE-2023-2629 | May 10, 2023 |
CSV Formula Injection in Pimcore Customer Data Framework <3.3.9Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9. |
|
| CVE-2023-2630 | May 10, 2023 |
Pimcore XSS pre-10.5.21 (Stored)Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. |
|