Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-core@9.5.50
Typecomposer
Namespacetypo3
Namecms-core
Version9.5.50
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.41
Latest_non_vulnerable_version14.0.2
Affected_by_vulnerabilities
0
url VCID-4t9s-p25a-cfas
vulnerability_id VCID-4t9s-p25a-cfas
summary
TYPO3 Allows Unrestricted File Upload in File Abstraction Layer
### Problem
By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., `.exe` files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a `.png` extension but actually carrying the MIME type `application/zip`).

Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> The mitigation strategies outlined below apply broadly to all file uploads handled through TYPO3's File Abstraction Layer (FAL), not just those performed via the backend interface. This means that any extension or custom integration leveraging FAL will also be subject to the new validation rules and configuration options. Developers are advised to review the implications for their code and refer to the [documentation of that change](https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/12.4.x/Important-106240-EnforceFile-extensionsAndMime-typeConsistencyInFileAbstractionLayer.html) for guidance.

> [!IMPORTANT]
>
> **Strong security defaults - Manual actions required**
> 
> These versions introduce new configuration options to better control which files are permitted for upload and to improve consistency checks.
> 
> A new configuration option, `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']`, has been added. This option allows administrators to explicitly define which file extensions should be permitted that are not already part of the built-in text or media file groups - examples include archive formats such as `zip` or `xz`.
> 
> In addition, two new feature flags have been introduced to enhance security:
> * `security.system.enforceAllowedFileExtensions`, enforces the defined list of allowed file extensions. This flag is enabled by default in new TYPO3 installations, but remains disabled in existing installations to prevent breaking changes.
> * `security.system.enforceFileExtensionMimeTypeConsistency`, ensures that the uploaded file’s extension matches its actual MIME type, providing further validation of file integrity. This flag is active by default.
> 
> It is recommended to configure the allowed file extensions via `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']` and to enable the feature flag `security.system.enforceAllowedFileExtensions` to enforce the restriction.

### Credits
Thanks to Hamed Kohi for reporting this issue, and to TYPO3 core & security team member Oliver Hader for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31966
published_at 2026-04-26T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32405
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32442
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32268
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-16T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32346
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32347
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32309
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32281
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32294
published_at 2026-04-18T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32265
published_at 2026-04-21T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.3209
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-014
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-014
6
reference_url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
reference_id GHSA-9hq9-cr36-4wpj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47939, GHSA-9hq9-cr36-4wpj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4t9s-p25a-cfas
1
url VCID-65ue-7jd9-23gf
vulnerability_id VCID-65ue-7jd9-23gf
summary
TYPO3 Unverified Password Change for Backend Users
### Problem
The backend user management interface allows password changes without requiring the current password. When an administrator updates their own account or modifies other user accounts via the admin interface, the current password is not requested for verification.

This behavior may lower the protection against unauthorized access in scenarios where an admin session is hijacked or left unattended, as it enables password changes without additional authentication.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> In these versions, administrators are required to verify their identity through step-up authentication (also known as sudo mode) when changing backend user passwords.

### Credits
Thanks to the National Cyber Security Center (NCSC) of Switzerland for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36292
published_at 2026-04-26T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36689
published_at 2026-04-02T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36721
published_at 2026-04-04T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36559
published_at 2026-04-07T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.3661
published_at 2026-04-08T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-09T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36636
published_at 2026-04-11T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-12T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36577
published_at 2026-04-13T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36623
published_at 2026-04-16T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36606
published_at 2026-04-18T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36545
published_at 2026-04-21T12:55:00Z
12
value 0.00158
scoring_system epss
scoring_elements 0.36322
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
1
reference_url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
2
reference_url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-013
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-013
6
reference_url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
reference_id GHSA-3jrg-97f3-rqh9
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47938, GHSA-3jrg-97f3-rqh9
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65ue-7jd9-23gf
2
url VCID-nubu-f1sc-gbes
vulnerability_id VCID-nubu-f1sc-gbes
summary
TYPO3 Allows Information Disclosure via DBAL Restriction Handling
### Problem
When performing a database query involving multiple tables through the database abstraction layer (DBAL), frontend user permissions are only applied via `FrontendGroupRestriction` to the last table. As a result, data from additional tables included in the same query may be unintentionally exposed to unauthorized users.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

### Credits
Thanks to Christian Futterlieb for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42198
published_at 2026-04-07T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-26T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42119
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42173
published_at 2026-04-21T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42256
published_at 2026-04-09T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42279
published_at 2026-04-11T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42249
published_at 2026-04-08T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42265
published_at 2026-04-16T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-02T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42215
published_at 2026-04-13T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42243
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-011
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-011
5
reference_url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
reference_id GHSA-x8pv-fgxp-8v3x
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47937, GHSA-x8pv-fgxp-8v3x
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nubu-f1sc-gbes
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.50