Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3fluid/fluid@2.0.3
Typecomposer
Namespacetypo3fluid
Namefluid
Version2.0.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.8
Latest_non_vulnerable_version2.6.10
Affected_by_vulnerabilities
0
url VCID-4qmp-u7bf-mfef
vulnerability_id VCID-4qmp-u7bf-mfef
summary
Cross-Site Scripting through Fluid view helper arguments
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
> * CWE-79

### Problem

Three XSS vulnerabilities have been detected in Fluid:

1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys.
2. ViewHelpers which used the `CompileWithContentArgumentAndRenderStatic` trait, and which declared `escapeOutput = false`, would receive the content argument in unescaped format.
3. Subclasses of AbstractConditionViewHelper would receive the `then` and `else` arguments in unescaped format.

### Solution
Update to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this `typo3fluid/fluid` package that fix the problem described.

Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:

* TYPO3 v9.5.23 (using typo3fluid/fluid v2.6.10)
* TYPO3 v10.4.10 (using typo3fluid/fluid v2.6.10)

The specific vulnerabilities are prevented by:

1. Explicitly escaping keys found in the `additionalAttributes` array passed to a TagBasedViewHelper before using them as attribute names.
2. Detecting "content argument" on ViewHelpers using the trait CompileWithContentArgumentAndRenderStatic and escaping it based on the state of `escapeChildren` when `escapeOutput` is toggled off. Escaping still will not occur if explicitly disabled by an enclosing ViewHelper. This homogenises escaping behavior of "content arguments" so the same strategy is used whether the "content" argument is passed as argument or child content.
3. Explicitly defining the `then` and `else` arguments on AbstractConditionViewHelper subclasses as escaped and applying escaping in all cases where escaping is not explicitly disabled by an enclosing ViewHelper.


### Affected cases

1. The fix for TagBasedViewHelper does not affect any valid use cases; it only prevents use of maliciously crafted attribute/value arrays passed as `additionalAttributes`.
2. Any case where a ViewHelper with a "content argument" and which defines `escapeOutput = false` is used with the content argument instead of passing variables as child node - e.g. `<v:h content="{variable}" />` instead of `<v:h>{variable}</v:h>` to intentionally circumvent escaping of any HTML in `{variable}`.
3. Any case where a condition ViewHelper is used with `then` or `else` arguments to render a variable containing HTML, excluding cases where the variable is intentionally unescaped - e.g. `<f:if condition="1" then="{variable -> f:format.raw()}" />`, and excluding any cases where a ViewHelper is used as argument value and the ViewHelper intentionally disables escaping - e.g. `<f:if condition="1" then="{f:render(section: 'MySection')}" />` does not escape the `then` argument because `f:render` disables output escaping.

Cases 2 and 3 can be mitigated to allow variables with HTML to not be escaped, by intentionally disabling escaping by chaining the variable used in the argument with `f:format.raw` as described in case 3. Note that this constitutes a potential security issue, for which the template author is solely responsible. Example: `<f:if condition="1" then="{intentionalHtmlVariable}" />` can allow HTML in `{intentionalHtmlVariable}` by adding `-> f:format.raw()` - to become `<f:if condition="1" then="{intentionalHtmlVariable -> f:format.raw()}" />`.

Custom ViewHelpers which use `CompileWithContentArgumentAndRenderStatic` can alternatively pass a 6th argument with value `false` to the call to `registerArgument` which registers the "content argument", which explicitly disables escaping of the argument value: `$this->registerArgument('arg', 'string', 'My argument', false, null, false);`. Note that this constitutes a potential security issue for which the ViewHelper author is solely responsible. **Variables containing HTML should only be allowed after taking great care to prevent XSS through other means, e.g. sanitising the variable before it is assigned to Fluid or only allowing such variables to come from trusted sources.**

### Credits
Thanks to Jonas Eberle and Sinan Sekerci (Dreamlab Technologies) who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.

### References
* [TYPO3-CORE-SA-2020-009](https://typo3.org/security/advisory/typo3-core-sa-2020-009)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26216
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.6899
published_at 2026-04-08T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.69038
published_at 2026-04-18T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.69029
published_at 2026-04-16T12:55:00Z
3
value 0.00583
scoring_system epss
scoring_elements 0.68989
published_at 2026-04-13T12:55:00Z
4
value 0.00583
scoring_system epss
scoring_elements 0.69032
published_at 2026-04-11T12:55:00Z
5
value 0.00583
scoring_system epss
scoring_elements 0.68923
published_at 2026-04-01T12:55:00Z
6
value 0.00583
scoring_system epss
scoring_elements 0.69009
published_at 2026-04-09T12:55:00Z
7
value 0.00583
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-07T12:55:00Z
8
value 0.00583
scoring_system epss
scoring_elements 0.6896
published_at 2026-04-04T12:55:00Z
9
value 0.00583
scoring_system epss
scoring_elements 0.69018
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26216
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-26216.yaml
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-26216.yaml
2
reference_url https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc
3
reference_url https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-26216
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-26216
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2020-009
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2020-009
6
reference_url https://github.com/advisories/GHSA-hpjm-3ww5-6cpf
reference_id GHSA-hpjm-3ww5-6cpf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hpjm-3ww5-6cpf
fixed_packages
0
url pkg:composer/typo3fluid/fluid@2.0.8
purl pkg:composer/typo3fluid/fluid@2.0.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.8
1
url pkg:composer/typo3fluid/fluid@2.1.7
purl pkg:composer/typo3fluid/fluid@2.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.1.7
2
url pkg:composer/typo3fluid/fluid@2.2.4
purl pkg:composer/typo3fluid/fluid@2.2.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.2.4
3
url pkg:composer/typo3fluid/fluid@2.3.7
purl pkg:composer/typo3fluid/fluid@2.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.3.7
4
url pkg:composer/typo3fluid/fluid@2.4.4
purl pkg:composer/typo3fluid/fluid@2.4.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.4.4
5
url pkg:composer/typo3fluid/fluid@2.5.11
purl pkg:composer/typo3fluid/fluid@2.5.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.5.11
6
url pkg:composer/typo3fluid/fluid@2.6.10
purl pkg:composer/typo3fluid/fluid@2.6.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.6.10
aliases CVE-2020-26216, GHSA-hpjm-3ww5-6cpf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qmp-u7bf-mfef
1
url VCID-f1rq-qudk-zkf2
vulnerability_id VCID-f1rq-qudk-zkf2
summary
Cross-Site Scripting in ternary conditional operator
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
> * CWE-79

---

:information_source: &nbsp;This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020

---

### Problem
It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.

```
{showFullName ? fullName : defaultValue}
```

### Solution
Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.

Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)
* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)

### Credits
Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.

### References
* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15241
reference_id
reference_type
scores
0
value 0.00341
scoring_system epss
scoring_elements 0.5689
published_at 2026-04-09T12:55:00Z
1
value 0.00341
scoring_system epss
scoring_elements 0.5686
published_at 2026-04-21T12:55:00Z
2
value 0.00341
scoring_system epss
scoring_elements 0.56883
published_at 2026-04-18T12:55:00Z
3
value 0.00341
scoring_system epss
scoring_elements 0.56886
published_at 2026-04-16T12:55:00Z
4
value 0.00341
scoring_system epss
scoring_elements 0.56856
published_at 2026-04-13T12:55:00Z
5
value 0.00341
scoring_system epss
scoring_elements 0.56879
published_at 2026-04-12T12:55:00Z
6
value 0.00341
scoring_system epss
scoring_elements 0.56899
published_at 2026-04-11T12:55:00Z
7
value 0.00341
scoring_system epss
scoring_elements 0.56744
published_at 2026-04-01T12:55:00Z
8
value 0.00341
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-02T12:55:00Z
9
value 0.00341
scoring_system epss
scoring_elements 0.56859
published_at 2026-04-04T12:55:00Z
10
value 0.00341
scoring_system epss
scoring_elements 0.56836
published_at 2026-04-07T12:55:00Z
11
value 0.00341
scoring_system epss
scoring_elements 0.56887
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15241
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-15241.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-15241.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-15241.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-15241.yaml
3
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-15241.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-15241.yaml
4
reference_url https://github.com/TYPO3/Fluid
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/Fluid
5
reference_url https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d
6
reference_url https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15241
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15241
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2019-013
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2019-013
9
reference_url https://github.com/advisories/GHSA-7733-hjv6-4h47
reference_id GHSA-7733-hjv6-4h47
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7733-hjv6-4h47
fixed_packages
0
url pkg:composer/typo3fluid/fluid@2.0.5
purl pkg:composer/typo3fluid/fluid@2.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.5
1
url pkg:composer/typo3fluid/fluid@2.1.4
purl pkg:composer/typo3fluid/fluid@2.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.1.4
2
url pkg:composer/typo3fluid/fluid@2.2.1
purl pkg:composer/typo3fluid/fluid@2.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.2.1
3
url pkg:composer/typo3fluid/fluid@2.3.5
purl pkg:composer/typo3fluid/fluid@2.3.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.3.5
4
url pkg:composer/typo3fluid/fluid@2.4.1
purl pkg:composer/typo3fluid/fluid@2.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.4.1
5
url pkg:composer/typo3fluid/fluid@2.5.5
purl pkg:composer/typo3fluid/fluid@2.5.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.5.5
6
url pkg:composer/typo3fluid/fluid@2.6.1
purl pkg:composer/typo3fluid/fluid@2.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qmp-u7bf-mfef
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.6.1
aliases CVE-2020-15241, GHSA-7733-hjv6-4h47
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1rq-qudk-zkf2
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.3