Pimcore Admin Classic Bundle
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Pimcore Admin Classic Bundle.
By the Year
In 2026 there have been 0 vulnerabilities in Pimcore Admin Classic Bundle. Admin Classic Bundle did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 5 | 9.00 |
| 2023 | 6 | 6.22 |
It may take a day or so for new Admin Classic Bundle vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pimcore Admin Classic Bundle Security Vulnerabilities
Pimcore Admin Classic Bundle Info Leak Exposed < 1.5.2,1.4.6,1.3.10
CVE-2024-41109
- July 30, 2024
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system. This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10.
Pimcore Admin Classic Bundle v<1.3.4 Host Header Injection in UserController for phishing
CVE-2024-25625
9.3 - Critical
- February 19, 2024
Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
Injection
Pimcore PHP ACL Bug: Tag Manipulation Without Permission (v<1.3.3)
CVE-2024-24822
9.1 - Critical
- February 07, 2024
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Prior to version 1.3.3, an attacker can create, delete etc. tags without having the permission to do so. A fix is available in version 1.3.3. As a workaround, one may apply the patch manually.
AuthZ
SQLi in Pimcore Admin Classic Bundle <1.3.2
CVE-2024-23646
8.8 - High
- January 24, 2024
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue.
SQL Injection
Pimcore Admin Bundle 1.2.3 Fixes Host Header URL Token Theft (CVE-2024-23648)
CVE-2024-23648
8.8 - High
- January 24, 2024
Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password. The URL sent contains a unique token, valid during 24 hours, allowing the user to reset its password. This token is highly sensitive ; as an attacker able to retrieve it would be able to resets the user's password. Prior to version 1.2.3, the reset-password URL is crafted using the "Host" HTTP header of the request sent to request a password reset. This way, an external attacker could send password requests for users, but specify a "Host" header of a website that they control. If the user receiving the mail clicks on the link, the attacker would retrieve the reset token of the victim and perform account takeover. Version 1.2.3 fixes this issue.
Injection
Pimcore Admin Classic Bundle <=1.2.1 Bypass TFA for non-admin users
CVE-2023-49075
7.2 - High
- November 28, 2023
The Admin Classic Bundle provides a Backend UI for Pimcore. `AdminBundle\Security\PimcoreUserTwoFactorCondition` introduced in v11 disable the two factor authentication for all non-admin security firewalls. An authenticated user can access the system without having to provide the two factor credentials. This issue has been patched in version 1.2.2.
Use of Single-factor Authentication
Pimcore Admin Classic Bundle <1.2.1: Full Path Disclosure via fopen
CVE-2023-47636
5.3 - Medium
- November 15, 2023
The Pimcore Admin Classic Bundle provides a Backend UI for Pimcore. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path "fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)". This issue has been patched in commit `10d178ef771` which has been included in release version 1.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Pimcore Admin Classic Bundle XSS < 1.2.0: Cookie Theft & Unauthorized Access
CVE-2023-46722
6.1 - Medium
- October 31, 2023
The Pimcore Admin Classic Bundle provides a backend UI for Pimcore. Prior to version 1.2.0, a cross-site scripting vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 1.2.0 to receive a patch or, as a workaround, apply the patch manually.
XSS
Unverified Password Change Pimcore Admin UI Classic Bundle <1.2.0
CVE-2023-5844
7.2 - High
- October 30, 2023
Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0.
authentification
Pimcore 1.1.2 admin-ui-classic-bundle sprintf parsing in translation '%s'
CVE-2023-42817
5.4 - Medium
- September 25, 2023
Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including %s (from %suggest%) is parsed by sprintf() even though its supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain modules) and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit `abd77392` which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually.
XSS
Pimcore Admin Classic Bundle <=1.0.3: XSS via ExtJS UI without 2FA
CVE-2023-37280
6.1 - Medium
- July 11, 2023
Pimcore Admin Classic Bundle provides a Backend UI for Pimcore based on the ExtJS framework. An admin who has not setup two factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts/HTML content. This vulnerability has been patched in version 1.0.3.
XSS
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Pimcore Admin Classic Bundle or by Pimcore? Click the Watch button to subscribe.