Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-core@9.5.29
Typecomposer
Namespacetypo3
Namecms-core
Version9.5.29
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.41
Latest_non_vulnerable_version14.0.2
Affected_by_vulnerabilities
0
url VCID-4jpa-6fqh-hbfg
vulnerability_id VCID-4jpa-6fqh-hbfg
summary
Cross-Site Scripting in TYPO3's Form Framework
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9)

### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.

### Credits
Thanks to Gabe Troyan who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2022-003](https://typo3.org/security/advisory/typo3-core-sa-2022-003)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31048
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70274
published_at 2026-04-08T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-18T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70327
published_at 2026-04-16T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70286
published_at 2026-04-13T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70299
published_at 2026-04-12T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.70313
published_at 2026-04-11T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70289
published_at 2026-04-09T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70234
published_at 2026-04-02T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.70251
published_at 2026-04-04T12:55:00Z
9
value 0.0063
scoring_system epss
scoring_elements 0.70228
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31048
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31048.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31048.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31048.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31048.yaml
3
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
4
reference_url https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:16Z/
url https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:16Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31048
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31048
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-003
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:16Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-003
8
reference_url https://github.com/advisories/GHSA-3r95-23jp-mhvg
reference_id GHSA-3r95-23jp-mhvg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3r95-23jp-mhvg
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.35
purl pkg:composer/typo3/cms-core@9.5.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.35
1
url pkg:composer/typo3/cms-core@10.4.29
purl pkg:composer/typo3/cms-core@10.4.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vwb2-a84s-5qak
22
vulnerability VCID-vyvy-y3cw-hbgr
23
vulnerability VCID-w13x-3rp9-wyej
24
vulnerability VCID-xy6y-312d-rygj
25
vulnerability VCID-zdq2-dhb2-6kaq
26
vulnerability VCID-zn99-ywte-33g6
27
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.29
2
url pkg:composer/typo3/cms-core@11.5.11
purl pkg:composer/typo3/cms-core@11.5.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-tnxn-p13f-yuah
21
vulnerability VCID-ve7g-8st5-wffb
22
vulnerability VCID-vwb2-a84s-5qak
23
vulnerability VCID-vyvy-y3cw-hbgr
24
vulnerability VCID-w13x-3rp9-wyej
25
vulnerability VCID-xy6y-312d-rygj
26
vulnerability VCID-zdq2-dhb2-6kaq
27
vulnerability VCID-zn99-ywte-33g6
28
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.11
aliases CVE-2022-31048, GHSA-3r95-23jp-mhvg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jpa-6fqh-hbfg
1
url VCID-4t9s-p25a-cfas
vulnerability_id VCID-4t9s-p25a-cfas
summary
TYPO3 Allows Unrestricted File Upload in File Abstraction Layer
### Problem
By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., `.exe` files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a `.png` extension but actually carrying the MIME type `application/zip`).

Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> The mitigation strategies outlined below apply broadly to all file uploads handled through TYPO3's File Abstraction Layer (FAL), not just those performed via the backend interface. This means that any extension or custom integration leveraging FAL will also be subject to the new validation rules and configuration options. Developers are advised to review the implications for their code and refer to the [documentation of that change](https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/12.4.x/Important-106240-EnforceFile-extensionsAndMime-typeConsistencyInFileAbstractionLayer.html) for guidance.

> [!IMPORTANT]
>
> **Strong security defaults - Manual actions required**
> 
> These versions introduce new configuration options to better control which files are permitted for upload and to improve consistency checks.
> 
> A new configuration option, `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']`, has been added. This option allows administrators to explicitly define which file extensions should be permitted that are not already part of the built-in text or media file groups - examples include archive formats such as `zip` or `xz`.
> 
> In addition, two new feature flags have been introduced to enhance security:
> * `security.system.enforceAllowedFileExtensions`, enforces the defined list of allowed file extensions. This flag is enabled by default in new TYPO3 installations, but remains disabled in existing installations to prevent breaking changes.
> * `security.system.enforceFileExtensionMimeTypeConsistency`, ensures that the uploaded file’s extension matches its actual MIME type, providing further validation of file integrity. This flag is active by default.
> 
> It is recommended to configure the allowed file extensions via `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']` and to enable the feature flag `security.system.enforceAllowedFileExtensions` to enforce the restriction.

### Credits
Thanks to Hamed Kohi for reporting this issue, and to TYPO3 core & security team member Oliver Hader for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32405
published_at 2026-04-02T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32294
published_at 2026-04-18T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32281
published_at 2026-04-13T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32309
published_at 2026-04-12T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32347
published_at 2026-04-11T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32346
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-16T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32268
published_at 2026-04-07T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32442
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-014
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-014
6
reference_url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
reference_id GHSA-9hq9-cr36-4wpj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47939, GHSA-9hq9-cr36-4wpj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4t9s-p25a-cfas
2
url VCID-5paq-5frf-43ed
vulnerability_id VCID-5paq-5frf-43ed
summary
TYPO3 CMS Stored Cross-Site Scripting via FileDumpController
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0)

### Problem
It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed to exploit this vulnerability.

### Solution
Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem described above.

### Credits
Thanks to Vautia who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-009](https://typo3.org/security/advisory/typo3-core-sa-2022-009)
* [Vulnerability Report on huntr.dev](https://huntr.dev/bounties/51e9b709-193c-41fd-bd4a-833aaca0bd4e/) (embargoed +30 days)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36107
reference_id
reference_type
scores
0
value 0.00687
scoring_system epss
scoring_elements 0.71682
published_at 2026-04-02T12:55:00Z
1
value 0.00687
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-12T12:55:00Z
2
value 0.00687
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-11T12:55:00Z
3
value 0.00687
scoring_system epss
scoring_elements 0.71723
published_at 2026-04-09T12:55:00Z
4
value 0.00687
scoring_system epss
scoring_elements 0.71712
published_at 2026-04-08T12:55:00Z
5
value 0.00687
scoring_system epss
scoring_elements 0.71673
published_at 2026-04-07T12:55:00Z
6
value 0.00687
scoring_system epss
scoring_elements 0.717
published_at 2026-04-04T12:55:00Z
7
value 0.00687
scoring_system epss
scoring_elements 0.71762
published_at 2026-04-18T12:55:00Z
8
value 0.00687
scoring_system epss
scoring_elements 0.71756
published_at 2026-04-16T12:55:00Z
9
value 0.00687
scoring_system epss
scoring_elements 0.71713
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36107
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36107.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36107.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36107.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36107.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/546208428c861a09d62b86cde141eb19a81fae66
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/546208428c861a09d62b86cde141eb19a81fae66
5
reference_url https://github.com/TYPO3/typo3/commit/bd58d2ff2eeef89e63ef754a2389597d22622a39
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/bd58d2ff2eeef89e63ef754a2389597d22622a39
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-9c6w-55cp-5w25
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-9c6w-55cp-5w25
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36107
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36107
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-009
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-009
9
reference_url https://github.com/advisories/GHSA-9c6w-55cp-5w25
reference_id GHSA-9c6w-55cp-5w25
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9c6w-55cp-5w25
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.37
purl pkg:composer/typo3/cms-core@9.5.37
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.37
1
url pkg:composer/typo3/cms-core@10.4.32
purl pkg:composer/typo3/cms-core@10.4.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.32
2
url pkg:composer/typo3/cms-core@11.5.16
purl pkg:composer/typo3/cms-core@11.5.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.16
aliases CVE-2022-36107, GHSA-9c6w-55cp-5w25
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5paq-5frf-43ed
3
url VCID-65ue-7jd9-23gf
vulnerability_id VCID-65ue-7jd9-23gf
summary
TYPO3 Unverified Password Change for Backend Users
### Problem
The backend user management interface allows password changes without requiring the current password. When an administrator updates their own account or modifies other user accounts via the admin interface, the current password is not requested for verification.

This behavior may lower the protection against unauthorized access in scenarios where an admin session is hijacked or left unattended, as it enables password changes without additional authentication.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> In these versions, administrators are required to verify their identity through step-up authentication (also known as sudo mode) when changing backend user passwords.

### Credits
Thanks to the National Cyber Security Center (NCSC) of Switzerland for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36689
published_at 2026-04-02T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36606
published_at 2026-04-18T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36623
published_at 2026-04-16T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36577
published_at 2026-04-13T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36559
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36721
published_at 2026-04-04T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.3661
published_at 2026-04-08T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-09T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36636
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
1
reference_url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
2
reference_url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-013
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-013
6
reference_url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
reference_id GHSA-3jrg-97f3-rqh9
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47938, GHSA-3jrg-97f3-rqh9
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65ue-7jd9-23gf
4
url VCID-8d2m-1ffv-jqe1
vulnerability_id VCID-8d2m-1ffv-jqe1
summary
TYPO3 vulnerable to Cross-Site Scripting in the Form Manager Module
### Problem
The form manager backend module is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to the form module.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

### Credits
Thanks to TYPO3 core & security team member Benjamin Franzke who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2024-008](https://typo3.org/security/advisory/typo3-core-sa-2024-008)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34356
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-02T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70421
published_at 2026-04-18T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-16T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70369
published_at 2026-04-13T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70383
published_at 2026-04-12T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70399
published_at 2026-04-11T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70375
published_at 2026-04-09T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-08T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70315
published_at 2026-04-07T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34356
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156
3
reference_url https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5
4
reference_url https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34356
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34356
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-008
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-008
8
reference_url https://github.com/advisories/GHSA-v6mw-h7w6-59w3
reference_id GHSA-v6mw-h7w6-59w3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v6mw-h7w6-59w3
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.48
purl pkg:composer/typo3/cms-core@9.5.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.48
1
url pkg:composer/typo3/cms-core@10.4.45
purl pkg:composer/typo3/cms-core@10.4.45
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.45
2
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
3
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
4
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34356, GHSA-v6mw-h7w6-59w3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8d2m-1ffv-jqe1
5
url VCID-axvk-13qf-tka7
vulnerability_id VCID-axvk-13qf-tka7
summary
TYPO3 Install Tool vulnerable to Code Execution
### Problem
Several settings in the Install Tool for configuring the path to system binaries were vulnerable to code execution. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions.

The corresponding change for this advisory involves enforcing the known disadvantages described in [TYPO3-PSA-2020-002: Protecting Install Tool with Sudo Mode](https://typo3.org/security/advisory/typo3-psa-2020-002).

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to Rickmer Frier & Daniel Jonka who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-002](https://typo3.org/security/advisory/typo3-core-sa-2024-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22188
reference_id
reference_type
scores
0
value 0.00687
scoring_system epss
scoring_elements 0.71704
published_at 2026-04-08T12:55:00Z
1
value 0.00687
scoring_system epss
scoring_elements 0.71753
published_at 2026-04-18T12:55:00Z
2
value 0.00687
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-16T12:55:00Z
3
value 0.00687
scoring_system epss
scoring_elements 0.71703
published_at 2026-04-13T12:55:00Z
4
value 0.00687
scoring_system epss
scoring_elements 0.71721
published_at 2026-04-12T12:55:00Z
5
value 0.00687
scoring_system epss
scoring_elements 0.71738
published_at 2026-04-11T12:55:00Z
6
value 0.00687
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-09T12:55:00Z
7
value 0.00687
scoring_system epss
scoring_elements 0.71692
published_at 2026-04-04T12:55:00Z
8
value 0.00687
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-07T12:55:00Z
9
value 0.00687
scoring_system epss
scoring_elements 0.71674
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22188
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/47e897f8c7668ef299ecc9ce93f52cafbb3497ed
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/47e897f8c7668ef299ecc9ce93f52cafbb3497ed
3
reference_url https://github.com/TYPO3/typo3/commit/6cc11761b8e2434fa4ccc9f096c65ca82569cfdf
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/6cc11761b8e2434fa4ccc9f096c65ca82569cfdf
4
reference_url https://github.com/TYPO3/typo3/commit/84e07e35b880a544b517868432c56987d05d46d4
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/84e07e35b880a544b517868432c56987d05d46d4
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-5w2h-59j3-8x5w
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T16:17:44Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-5w2h-59j3-8x5w
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22188
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22188
7
reference_url https://typo3.org/help/security-advisories
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/help/security-advisories
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-002
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T16:17:44Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-002
9
reference_url https://typo3.org/security/advisory/typo3-psa-2020-002
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-psa-2020-002
10
reference_url https://github.com/advisories/GHSA-5w2h-59j3-8x5w
reference_id GHSA-5w2h-59j3-8x5w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5w2h-59j3-8x5w
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.46
purl pkg:composer/typo3/cms-core@9.5.46
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.46
1
url pkg:composer/typo3/cms-core@10.4.43
purl pkg:composer/typo3/cms-core@10.4.43
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.43
2
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
3
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
4
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-22188, GHSA-5w2h-59j3-8x5w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axvk-13qf-tka7
6
url VCID-b6er-h7dm-3bev
vulnerability_id VCID-b6er-h7dm-3bev
summary
TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)

### Problem
Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows to by-pass the cross-site scripting mechanism of [`typo3/html-sanitizer`](https://github.com/TYPO3/html-sanitizer).

### Solution
Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem described above.

### Credits
Thanks to David Klein who reported this issue, and to TYPO3 security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-011](https://typo3.org/security/advisory/typo3-core-sa-2022-011)
* [GHSA-47m6-46mj-p235](https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235)
references
0
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
1
reference_url https://github.com/TYPO3/typo3/commit/d4f260570abd934fcf3819370a135bef33d729b7
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/d4f260570abd934fcf3819370a135bef33d729b7
2
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-gqqf-g5r7-84vf
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-gqqf-g5r7-84vf
3
reference_url https://github.com/advisories/GHSA-gqqf-g5r7-84vf
reference_id GHSA-gqqf-g5r7-84vf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gqqf-g5r7-84vf
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.37
purl pkg:composer/typo3/cms-core@9.5.37
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.37
1
url pkg:composer/typo3/cms-core@10.4.32
purl pkg:composer/typo3/cms-core@10.4.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.32
2
url pkg:composer/typo3/cms-core@11.5.16
purl pkg:composer/typo3/cms-core@11.5.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.16
aliases GHSA-gqqf-g5r7-84vf, GMS-2022-4096
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6er-h7dm-3bev
7
url VCID-bajy-qbwq-fufn
vulnerability_id VCID-bajy-qbwq-fufn
summary
Insertion of Sensitive Information into Log File in typo3/cms-core
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)

### Problem
It has been discovered that system internal credentials or keys (e.g. database credentials) have been logged as plaintext in exception handlers, when logging the complete exception stack trace.

### Solution
Update to TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.

### Credits
Thanks to Marco Huber who reported this issue and to TYPO3 security member Torben Hansen who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-002](https://typo3.org/security/advisory/typo3-core-sa-2022-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31047
reference_id
reference_type
scores
0
value 0.00391
scoring_system epss
scoring_elements 0.60107
published_at 2026-04-02T12:55:00Z
1
value 0.00391
scoring_system epss
scoring_elements 0.60201
published_at 2026-04-18T12:55:00Z
2
value 0.00391
scoring_system epss
scoring_elements 0.60194
published_at 2026-04-16T12:55:00Z
3
value 0.00391
scoring_system epss
scoring_elements 0.60155
published_at 2026-04-13T12:55:00Z
4
value 0.00391
scoring_system epss
scoring_elements 0.60173
published_at 2026-04-12T12:55:00Z
5
value 0.00391
scoring_system epss
scoring_elements 0.60187
published_at 2026-04-11T12:55:00Z
6
value 0.00391
scoring_system epss
scoring_elements 0.60165
published_at 2026-04-09T12:55:00Z
7
value 0.00391
scoring_system epss
scoring_elements 0.60151
published_at 2026-04-08T12:55:00Z
8
value 0.00391
scoring_system epss
scoring_elements 0.60101
published_at 2026-04-07T12:55:00Z
9
value 0.00391
scoring_system epss
scoring_elements 0.60132
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31047
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31047.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31047.yaml
2
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
3
reference_url https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:23Z/
url https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a
4
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:23Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31047
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31047
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-002
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:23Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-002
7
reference_url https://github.com/advisories/GHSA-fh99-4pgr-8j99
reference_id GHSA-fh99-4pgr-8j99
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fh99-4pgr-8j99
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.35
purl pkg:composer/typo3/cms-core@9.5.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.35
1
url pkg:composer/typo3/cms-core@10.4.29
purl pkg:composer/typo3/cms-core@10.4.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vwb2-a84s-5qak
22
vulnerability VCID-vyvy-y3cw-hbgr
23
vulnerability VCID-w13x-3rp9-wyej
24
vulnerability VCID-xy6y-312d-rygj
25
vulnerability VCID-zdq2-dhb2-6kaq
26
vulnerability VCID-zn99-ywte-33g6
27
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.29
2
url pkg:composer/typo3/cms-core@11.5.11
purl pkg:composer/typo3/cms-core@11.5.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-tnxn-p13f-yuah
21
vulnerability VCID-ve7g-8st5-wffb
22
vulnerability VCID-vwb2-a84s-5qak
23
vulnerability VCID-vyvy-y3cw-hbgr
24
vulnerability VCID-w13x-3rp9-wyej
25
vulnerability VCID-xy6y-312d-rygj
26
vulnerability VCID-zdq2-dhb2-6kaq
27
vulnerability VCID-zn99-ywte-33g6
28
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.11
aliases CVE-2022-31047, GHSA-fh99-4pgr-8j99
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bajy-qbwq-fufn
8
url VCID-e32h-8q61-hbgc
vulnerability_id VCID-e32h-8q61-hbgc
summary
Cross-Site Scripting in TYPO3's Frontend Login Mailer
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9)

### Problem
User submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages.

### Solution
Update to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.

### Credits
Thanks to Christian Seifert who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-004](https://typo3.org/security/advisory/typo3-core-sa-2022-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31049
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70274
published_at 2026-04-08T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.70234
published_at 2026-04-02T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-18T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70327
published_at 2026-04-16T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70286
published_at 2026-04-13T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.70299
published_at 2026-04-12T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70313
published_at 2026-04-11T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70289
published_at 2026-04-09T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.70251
published_at 2026-04-04T12:55:00Z
9
value 0.0063
scoring_system epss
scoring_elements 0.70228
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31049
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31049.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31049.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31049.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31049.yaml
3
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
4
reference_url https://github.com/TYPO3/typo3/commit/da611775f92102d7602713003f4c79606c8a445d
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:18Z/
url https://github.com/TYPO3/typo3/commit/da611775f92102d7602713003f4c79606c8a445d
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-h4mx-xv96-2jgm
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:18Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-h4mx-xv96-2jgm
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31049
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31049
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-004
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:18Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-004
8
reference_url https://github.com/advisories/GHSA-h4mx-xv96-2jgm
reference_id GHSA-h4mx-xv96-2jgm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h4mx-xv96-2jgm
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.35
purl pkg:composer/typo3/cms-core@9.5.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.35
1
url pkg:composer/typo3/cms-core@10.4.29
purl pkg:composer/typo3/cms-core@10.4.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vwb2-a84s-5qak
22
vulnerability VCID-vyvy-y3cw-hbgr
23
vulnerability VCID-w13x-3rp9-wyej
24
vulnerability VCID-xy6y-312d-rygj
25
vulnerability VCID-zdq2-dhb2-6kaq
26
vulnerability VCID-zn99-ywte-33g6
27
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.29
2
url pkg:composer/typo3/cms-core@11.5.11
purl pkg:composer/typo3/cms-core@11.5.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-tnxn-p13f-yuah
21
vulnerability VCID-ve7g-8st5-wffb
22
vulnerability VCID-vwb2-a84s-5qak
23
vulnerability VCID-vyvy-y3cw-hbgr
24
vulnerability VCID-w13x-3rp9-wyej
25
vulnerability VCID-xy6y-312d-rygj
26
vulnerability VCID-zdq2-dhb2-6kaq
27
vulnerability VCID-zn99-ywte-33g6
28
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.11
aliases CVE-2022-31049, GHSA-h4mx-xv96-2jgm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e32h-8q61-hbgc
9
url VCID-g4uc-qeb6-myed
vulnerability_id VCID-g4uc-qeb6-myed
summary
TYPO3 Install Tool vulnerable to Information Disclosure of Encryption Key
### Problem
The plaintext value of `$GLOBALS['SYS']['encryptionKey']` was displayed in the editing forms of the TYPO3 Install Tool user interface. This allowed attackers to utilize the value to generate cryptographic hashes used for verifying the authenticity of HTTP request parameters. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-004](https://typo3.org/security/advisory/typo3-core-sa-2024-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25119
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52471
published_at 2026-04-02T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-18T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52569
published_at 2026-04-16T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-13T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-12T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52562
published_at 2026-04-11T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52511
published_at 2026-04-09T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52517
published_at 2026-04-08T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52464
published_at 2026-04-07T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52498
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25119
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/14d101359c71ee963cf51ad0c8ae777b7b9ec9a1
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/14d101359c71ee963cf51ad0c8ae777b7b9ec9a1
3
reference_url https://github.com/TYPO3/typo3/commit/df486372ea56fac241d3c96ad43a7729fee64557
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/df486372ea56fac241d3c96ad43a7729fee64557
4
reference_url https://github.com/TYPO3/typo3/commit/fa12667c046342ebfd9b159c646aeafdbc52fcfd
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/fa12667c046342ebfd9b159c646aeafdbc52fcfd
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-h47m-3f78-qp9g
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:01:19Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-h47m-3f78-qp9g
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25119
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25119
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-004
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:01:19Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-004
8
reference_url https://github.com/advisories/GHSA-h47m-3f78-qp9g
reference_id GHSA-h47m-3f78-qp9g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h47m-3f78-qp9g
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.46
purl pkg:composer/typo3/cms-core@9.5.46
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.46
1
url pkg:composer/typo3/cms-core@10.4.43
purl pkg:composer/typo3/cms-core@10.4.43
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.43
2
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
3
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
4
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25119, GHSA-h47m-3f78-qp9g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4uc-qeb6-myed
10
url VCID-gv1b-xtv4-4yg3
vulnerability_id VCID-gv1b-xtv4-4yg3
summary
TYPO3 Backend Forms vulnerable to Information Disclosure of Hashed Passwords
### Problem
Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using brute force techniques. Exploiting this vulnerability requires a valid backend user account.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to the TYPO3 framework merger Christian Kuhn and external security researchers Maximilian Beckmann, Klaus-Günther Schmidt who reported this issue, and TYPO3 security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-003](https://typo3.org/security/advisory/typo3-core-sa-2024-003)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25118
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66278
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66361
published_at 2026-04-18T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66346
published_at 2026-04-16T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66311
published_at 2026-04-13T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66342
published_at 2026-04-12T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66355
published_at 2026-04-11T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66335
published_at 2026-04-09T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66321
published_at 2026-04-08T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66274
published_at 2026-04-07T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66304
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25118
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/1186b2fec8a665a8f228ed66e6d60abf8407c17b
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1186b2fec8a665a8f228ed66e6d60abf8407c17b
3
reference_url https://github.com/TYPO3/typo3/commit/c7a135c25a14b852eebe4335f21ba3c606188f3a
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/c7a135c25a14b852eebe4335f21ba3c606188f3a
4
reference_url https://github.com/TYPO3/typo3/commit/cafc5af7fdce7734e6c8f9ecf2efd17b246fc049
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/cafc5af7fdce7734e6c8f9ecf2efd17b246fc049
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-38r2-5695-334w
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T17:58:02Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-38r2-5695-334w
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25118
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25118
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-003
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T17:58:02Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-003
8
reference_url https://github.com/advisories/GHSA-38r2-5695-334w
reference_id GHSA-38r2-5695-334w
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-38r2-5695-334w
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.46
purl pkg:composer/typo3/cms-core@9.5.46
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.46
1
url pkg:composer/typo3/cms-core@10.4.43
purl pkg:composer/typo3/cms-core@10.4.43
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.43
2
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
3
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
4
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25118, GHSA-38r2-5695-334w
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv1b-xtv4-4yg3
11
url VCID-h6y3-7gsq-skh2
vulnerability_id VCID-h6y3-7gsq-skh2
summary
TYPO3 vulnerable to Weak Authentication in Session Handling
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability has been addressed in versions 8.7.55, 9.5.44, 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47127
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39866
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39861
published_at 2026-04-18T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39839
published_at 2026-04-13T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39856
published_at 2026-04-12T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.3989
published_at 2026-04-11T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.3988
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39867
published_at 2026-04-08T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39812
published_at 2026-04-07T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39889
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47127
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2023-47127.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2023-47127.yaml
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-006
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-006
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-47127
reference_id CVE-2023-47127
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-47127
6
reference_url https://github.com/advisories/GHSA-3vmm-7h4j-69rm
reference_id GHSA-3vmm-7h4j-69rm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3vmm-7h4j-69rm
7
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
reference_id GHSA-3vmm-7h4j-69rm
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.44
purl pkg:composer/typo3/cms-core@9.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.44
1
url pkg:composer/typo3/cms-core@10.4.41
purl pkg:composer/typo3/cms-core@10.4.41
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.41
2
url pkg:composer/typo3/cms-core@11.5.33
purl pkg:composer/typo3/cms-core@11.5.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-mud2-s4rc-fuf6
9
vulnerability VCID-n7ng-zkkb-2qaz
10
vulnerability VCID-nubu-f1sc-gbes
11
vulnerability VCID-taj6-zj2n-5kg8
12
vulnerability VCID-xy6y-312d-rygj
13
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.33
3
url pkg:composer/typo3/cms-core@12.4.8
purl pkg:composer/typo3/cms-core@12.4.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-jxw7-skw6-q7bg
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.8
aliases CVE-2023-47127, GHSA-3vmm-7h4j-69rm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6y3-7gsq-skh2
12
url VCID-mnz3-rj21-67ad
vulnerability_id VCID-mnz3-rj21-67ad
summary
TYPO3 CMS vulnerable to User Enumeration via Response Timing
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.9)

### Problem
It has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts.

Extension authors of 3rd party TYPO3 extensions providing a custom authentication service should check if the extension is affected by the described problem. Affected extensions must implement new `MimicServiceInterface::mimicAuthUser`, which simulates corresponding times regular processing would usually take.

### Solution
Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem described above.

### Credits
Thanks to Vautia who reported this issue and to TYPO3 core & security team members Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-007](https://typo3.org/security/advisory/typo3-core-sa-2022-007)
* [Vulnerability Report on huntr.dev](https://huntr.dev/bounties/7d519735-2877-4fad-bd77-accde3e290a7/) (embargoed +30 days)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36105
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51649
published_at 2026-04-02T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51712
published_at 2026-04-12T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51734
published_at 2026-04-11T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51685
published_at 2026-04-09T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51689
published_at 2026-04-08T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51634
published_at 2026-04-07T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.51674
published_at 2026-04-04T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.51744
published_at 2026-04-18T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51737
published_at 2026-04-16T12:55:00Z
9
value 0.00283
scoring_system epss
scoring_elements 0.51696
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36105
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36105.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36105.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36105.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36105.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/f0fc9c4cd7c38207c30dd158de53ee5d9d6f41a2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/f0fc9c4cd7c38207c30dd158de53ee5d9d6f41a2
5
reference_url https://github.com/TYPO3/typo3/commit/f8b83ce15d4ea275a5a5e564e5d324242f7937b6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:34Z/
url https://github.com/TYPO3/typo3/commit/f8b83ce15d4ea275a5a5e564e5d324242f7937b6
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-m392-235j-9r7r
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:34Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-m392-235j-9r7r
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36105
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36105
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-007
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:51:34Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-007
9
reference_url https://github.com/advisories/GHSA-m392-235j-9r7r
reference_id GHSA-m392-235j-9r7r
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m392-235j-9r7r
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.37
purl pkg:composer/typo3/cms-core@9.5.37
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.37
1
url pkg:composer/typo3/cms-core@10.4.32
purl pkg:composer/typo3/cms-core@10.4.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.32
2
url pkg:composer/typo3/cms-core@11.5.16
purl pkg:composer/typo3/cms-core@11.5.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-8sdd-b1bn-cuhx
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-g4uc-qeb6-myed
7
vulnerability VCID-gv1b-xtv4-4yg3
8
vulnerability VCID-gyyu-n3b1-zbcj
9
vulnerability VCID-h6y3-7gsq-skh2
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-t1n7-eswt-73gw
14
vulnerability VCID-taj6-zj2n-5kg8
15
vulnerability VCID-ve7g-8st5-wffb
16
vulnerability VCID-vyvy-y3cw-hbgr
17
vulnerability VCID-w13x-3rp9-wyej
18
vulnerability VCID-xy6y-312d-rygj
19
vulnerability VCID-zdq2-dhb2-6kaq
20
vulnerability VCID-zn99-ywte-33g6
21
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.16
aliases CVE-2022-36105, GHSA-m392-235j-9r7r
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnz3-rj21-67ad
13
url VCID-mud2-s4rc-fuf6
vulnerability_id VCID-mud2-s4rc-fuf6
summary
TYPO3 vulnerable to an Uncontrolled Resource Consumption in the ShowImageController
### Problem
The `ShowImageController` (_eID tx_cms_showpic_) lacks a cryptographic HMAC-signature on the `frame` HTTP query parameter (e.g. `/index.php?eID=tx_cms_showpic?file=3&...&frame=12345`).
This allows adversaries to instruct the system to produce an arbitrary number of thumbnail images on the server side.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

#### ℹ️ **Strong security defaults - Manual actions required**

The `frame` HTTP query parameter is now ignored, since it could not be used by core APIs.

The new feature flag `security.frontend.allowInsecureFrameOptionInShowImageController` – which is disabled per default – can be used to reactivate the previous behavior.

### Credits
Thanks to TYPO3 security team member Torben Hansen who reported this issue and to TYPO3 core & security team members Benjamin Mack and Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-010](https://typo3.org/security/advisory/typo3-core-sa-2024-010)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34358
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15666
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15479
published_at 2026-04-18T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-16T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15545
published_at 2026-04-13T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15608
published_at 2026-04-12T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15643
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15676
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15619
published_at 2026-04-08T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15533
published_at 2026-04-07T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1573
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34358
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/05c95fed869a1a6dcca06c7077b83b6ea866ff14
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/05c95fed869a1a6dcca06c7077b83b6ea866ff14
3
reference_url https://github.com/TYPO3/typo3/commit/1e70ebf736935413b0531004839362b4fb0755a5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/1e70ebf736935413b0531004839362b4fb0755a5
4
reference_url https://github.com/TYPO3/typo3/commit/df7909b6a1cf0f12a42994d0cc3376b607746142
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/df7909b6a1cf0f12a42994d0cc3376b607746142
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-36g8-62qv-5957
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-36g8-62qv-5957
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34358
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34358
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-010
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-010
8
reference_url https://github.com/advisories/GHSA-36g8-62qv-5957
reference_id GHSA-36g8-62qv-5957
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-36g8-62qv-5957
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.48
purl pkg:composer/typo3/cms-core@9.5.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.48
1
url pkg:composer/typo3/cms-core@10.4.45
purl pkg:composer/typo3/cms-core@10.4.45
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.45
2
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
3
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
4
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34358, GHSA-36g8-62qv-5957
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mud2-s4rc-fuf6
14
url VCID-n7ng-zkkb-2qaz
vulnerability_id VCID-n7ng-zkkb-2qaz
summary
TYPO3 vulnerable to Improper Access Control of Resources Referenced by t3:// URI Scheme
### Problem
The TYPO3-specific [`t3://` URI scheme](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references) could be used to access resources outside of the users' permission scope. This encompassed files, folders, pages, and records (although only if a valid link-handling configuration was provided). Exploiting this vulnerability requires a valid backend user account.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-005](https://typo3.org/security/advisory/typo3-core-sa-2024-005)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25120
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40722
published_at 2026-04-04T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40681
published_at 2026-04-18T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40711
published_at 2026-04-16T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40666
published_at 2026-04-13T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40684
published_at 2026-04-12T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40719
published_at 2026-04-11T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-09T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40695
published_at 2026-04-08T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40645
published_at 2026-04-07T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40694
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25120
1
reference_url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/2de87ff113ba24333ab7cbb8078588743f8958d6
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/2de87ff113ba24333ab7cbb8078588743f8958d6
4
reference_url https://github.com/TYPO3/typo3/commit/33f4d279b82bca0a509227a17065244c6156e68f
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/33f4d279b82bca0a509227a17065244c6156e68f
5
reference_url https://github.com/TYPO3/typo3/commit/ae0dfc4c058a90c10eedb3f49cfaf33164d21cdd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/ae0dfc4c058a90c10eedb3f49cfaf33164d21cdd
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-wf85-8hx9-gj7c
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-wf85-8hx9-gj7c
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25120
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25120
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-005
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-005
9
reference_url https://github.com/advisories/GHSA-wf85-8hx9-gj7c
reference_id GHSA-wf85-8hx9-gj7c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wf85-8hx9-gj7c
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.46
purl pkg:composer/typo3/cms-core@9.5.46
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.46
1
url pkg:composer/typo3/cms-core@10.4.43
purl pkg:composer/typo3/cms-core@10.4.43
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.43
2
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
3
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
4
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25120, GHSA-wf85-8hx9-gj7c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ng-zkkb-2qaz
15
url VCID-nubu-f1sc-gbes
vulnerability_id VCID-nubu-f1sc-gbes
summary
TYPO3 Allows Information Disclosure via DBAL Restriction Handling
### Problem
When performing a database query involving multiple tables through the database abstraction layer (DBAL), frontend user permissions are only applied via `FrontendGroupRestriction` to the last table. As a result, data from additional tables included in the same query may be unintentionally exposed to unauthorized users.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

### Credits
Thanks to Christian Futterlieb for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42256
published_at 2026-04-09T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-18T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42265
published_at 2026-04-16T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42215
published_at 2026-04-13T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-02T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42249
published_at 2026-04-08T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42198
published_at 2026-04-07T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42243
published_at 2026-04-12T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42279
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-011
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-011
5
reference_url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
reference_id GHSA-x8pv-fgxp-8v3x
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.51
purl pkg:composer/typo3/cms-core@9.5.51
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.51
1
url pkg:composer/typo3/cms-core@10.4.50
purl pkg:composer/typo3/cms-core@10.4.50
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.50
2
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
3
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
4
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47937, GHSA-x8pv-fgxp-8v3x
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nubu-f1sc-gbes
16
url VCID-remd-55jh-r3g5
vulnerability_id VCID-remd-55jh-r3g5
summary
Insufficient Session Expiration in TYPO3's Admin Tool
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6)

### Problem
Admin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit.

### Solution
Update to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.

### Credits
Thanks to Kien Hoang who reported this issue and to TYPO3 framework merger Ralf Zimmermann and TYPO3 security member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-005](https://typo3.org/security/advisory/typo3-core-sa-2022-005)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31050
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63156
published_at 2026-04-08T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63196
published_at 2026-04-18T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63188
published_at 2026-04-16T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63153
published_at 2026-04-13T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63176
published_at 2026-04-12T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63191
published_at 2026-04-11T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-09T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.6311
published_at 2026-04-02T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.6314
published_at 2026-04-04T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63104
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31050
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31050.yaml
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31050.yaml
2
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
3
reference_url https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:13Z/
url https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d
4
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:13Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31050
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31050
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-005
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:13Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-005
7
reference_url https://github.com/advisories/GHSA-wwjw-r3gj-39fq
reference_id GHSA-wwjw-r3gj-39fq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wwjw-r3gj-39fq
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.35
purl pkg:composer/typo3/cms-core@9.5.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.35
1
url pkg:composer/typo3/cms-core@10.4.29
purl pkg:composer/typo3/cms-core@10.4.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vwb2-a84s-5qak
22
vulnerability VCID-vyvy-y3cw-hbgr
23
vulnerability VCID-w13x-3rp9-wyej
24
vulnerability VCID-xy6y-312d-rygj
25
vulnerability VCID-zdq2-dhb2-6kaq
26
vulnerability VCID-zn99-ywte-33g6
27
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.29
2
url pkg:composer/typo3/cms-core@11.5.11
purl pkg:composer/typo3/cms-core@11.5.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-tnxn-p13f-yuah
21
vulnerability VCID-ve7g-8st5-wffb
22
vulnerability VCID-vwb2-a84s-5qak
23
vulnerability VCID-vyvy-y3cw-hbgr
24
vulnerability VCID-w13x-3rp9-wyej
25
vulnerability VCID-xy6y-312d-rygj
26
vulnerability VCID-zdq2-dhb2-6kaq
27
vulnerability VCID-zn99-ywte-33g6
28
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.11
aliases CVE-2022-31050, GHSA-wwjw-r3gj-39fq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-remd-55jh-r3g5
17
url VCID-s55j-8hbt-akhn
vulnerability_id VCID-s55j-8hbt-akhn
summary
Information Disclosure via Export Module
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.0)

### Problem
The export functionality fails to limit the result set to allowed columns of a particular database table. This allows authenticated users to export internal details of database tables to which they already have access.

### Solution
Update to TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.

In order to address this issue, access to mentioned export functionality is completely denied for regular backend users.

ℹ️  **Strong security defaults - Manual actions required**
Following User TSconfig setting would allow using the export functionality for particular users:
```
options.impexp.enableExportForNonAdminUser = 1
```

### Credits
Thanks to TYPO3 core merger Lina Wolf who reported this issue and to TYPO3 security member Torben Hansen  who fixed the issue.

### References
* [TYPO3-CORE-SA-2022-001](https://typo3.org/security/advisory/typo3-core-sa-2022-001)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31046
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35391
published_at 2026-04-08T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35437
published_at 2026-04-02T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35387
published_at 2026-04-18T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35398
published_at 2026-04-16T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35359
published_at 2026-04-13T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35381
published_at 2026-04-12T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35417
published_at 2026-04-11T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35416
published_at 2026-04-09T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35461
published_at 2026-04-04T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35345
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31046
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31046.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31046.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31046.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31046.yaml
3
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
4
reference_url https://github.com/TYPO3/typo3/commit/7447a3d1283017d2ee08737a7972c720001a93e9
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:21Z/
url https://github.com/TYPO3/typo3/commit/7447a3d1283017d2ee08737a7972c720001a93e9
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-8gmv-9hwg-w89g
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:21Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-8gmv-9hwg-w89g
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31046
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31046
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-001
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:21Z/
url https://typo3.org/security/advisory/typo3-core-sa-2022-001
8
reference_url https://github.com/advisories/GHSA-8gmv-9hwg-w89g
reference_id GHSA-8gmv-9hwg-w89g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8gmv-9hwg-w89g
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.35
purl pkg:composer/typo3/cms-core@9.5.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.35
1
url pkg:composer/typo3/cms-core@10.4.29
purl pkg:composer/typo3/cms-core@10.4.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vwb2-a84s-5qak
22
vulnerability VCID-vyvy-y3cw-hbgr
23
vulnerability VCID-w13x-3rp9-wyej
24
vulnerability VCID-xy6y-312d-rygj
25
vulnerability VCID-zdq2-dhb2-6kaq
26
vulnerability VCID-zn99-ywte-33g6
27
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.29
2
url pkg:composer/typo3/cms-core@11.5.11
purl pkg:composer/typo3/cms-core@11.5.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4t9s-p25a-cfas
3
vulnerability VCID-5paq-5frf-43ed
4
vulnerability VCID-65ue-7jd9-23gf
5
vulnerability VCID-8d2m-1ffv-jqe1
6
vulnerability VCID-8sdd-b1bn-cuhx
7
vulnerability VCID-av8u-rvzq-4fc7
8
vulnerability VCID-axvk-13qf-tka7
9
vulnerability VCID-b6er-h7dm-3bev
10
vulnerability VCID-g4uc-qeb6-myed
11
vulnerability VCID-gv1b-xtv4-4yg3
12
vulnerability VCID-gyyu-n3b1-zbcj
13
vulnerability VCID-h6y3-7gsq-skh2
14
vulnerability VCID-mnz3-rj21-67ad
15
vulnerability VCID-mud2-s4rc-fuf6
16
vulnerability VCID-n7ng-zkkb-2qaz
17
vulnerability VCID-nubu-f1sc-gbes
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-tnxn-p13f-yuah
21
vulnerability VCID-ve7g-8st5-wffb
22
vulnerability VCID-vwb2-a84s-5qak
23
vulnerability VCID-vyvy-y3cw-hbgr
24
vulnerability VCID-w13x-3rp9-wyej
25
vulnerability VCID-xy6y-312d-rygj
26
vulnerability VCID-zdq2-dhb2-6kaq
27
vulnerability VCID-zn99-ywte-33g6
28
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.11
aliases CVE-2022-31046, GHSA-8gmv-9hwg-w89g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s55j-8hbt-akhn
18
url VCID-t1n7-eswt-73gw
vulnerability_id VCID-t1n7-eswt-73gw
summary
TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework
### Problem
Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code.

The existence of individual TypoScript instructions for a particular form item (known as [`formDefinitionOverrides`](https://docs.typo3.org/c/typo3/cms-form/main/en-us/I/Concepts/FrontendRendering/Index.html#form-element-properties)) and a valid backend user account with access to the form module are needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-015](https://typo3.org/security/advisory/typo3-core-sa-2022-015)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23503
reference_id
reference_type
scores
0
value 0.00517
scoring_system epss
scoring_elements 0.66719
published_at 2026-04-08T12:55:00Z
1
value 0.00517
scoring_system epss
scoring_elements 0.66759
published_at 2026-04-18T12:55:00Z
2
value 0.00517
scoring_system epss
scoring_elements 0.66745
published_at 2026-04-16T12:55:00Z
3
value 0.00517
scoring_system epss
scoring_elements 0.66711
published_at 2026-04-13T12:55:00Z
4
value 0.00517
scoring_system epss
scoring_elements 0.6674
published_at 2026-04-12T12:55:00Z
5
value 0.00517
scoring_system epss
scoring_elements 0.66754
published_at 2026-04-11T12:55:00Z
6
value 0.00517
scoring_system epss
scoring_elements 0.66734
published_at 2026-04-09T12:55:00Z
7
value 0.00517
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-02T12:55:00Z
8
value 0.00517
scoring_system epss
scoring_elements 0.66697
published_at 2026-04-04T12:55:00Z
9
value 0.00517
scoring_system epss
scoring_elements 0.6667
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23503
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T18:23:57Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23503
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-015
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-015
8
reference_url https://github.com/advisories/GHSA-c5wx-6c2c-f7rm
reference_id GHSA-c5wx-6c2c-f7rm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c5wx-6c2c-f7rm
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
3
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23503, GHSA-c5wx-6c2c-f7rm, GMS-2022-8132
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1n7-eswt-73gw
19
url VCID-taj6-zj2n-5kg8
vulnerability_id VCID-taj6-zj2n-5kg8
summary
TYPO3 vulnerable to Improper Access Control Persisting File Abstraction Layer Entities via Data Handler
### Problem
Entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account.


### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

#### ℹ️ Strong security defaults - Manual actions required

When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore.

When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`.

### Credits
Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2024-006](https://typo3.org/security/advisory/typo3-core-sa-2024-006)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25121
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53262
published_at 2026-04-04T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53338
published_at 2026-04-18T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53332
published_at 2026-04-16T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53294
published_at 2026-04-13T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53311
published_at 2026-04-12T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53327
published_at 2026-04-11T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.53276
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53282
published_at 2026-04-08T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.5323
published_at 2026-04-07T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53236
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25121
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/38f0bf9a61e10365be26eb75bc23a81184dbed07
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/38f0bf9a61e10365be26eb75bc23a81184dbed07
3
reference_url https://github.com/TYPO3/typo3/commit/71e652bf84b16fd3592205f61f36750ab03db74c
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/71e652bf84b16fd3592205f61f36750ab03db74c
4
reference_url https://github.com/TYPO3/typo3/commit/b47b6ddf5a5f3f852c6e43f837360780c12e3c47
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/b47b6ddf5a5f3f852c6e43f837360780c12e3c47
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-rj3x-wvc6-5j66
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:07:53Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-rj3x-wvc6-5j66
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25121
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25121
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-006
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:07:53Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-006
8
reference_url https://github.com/advisories/GHSA-rj3x-wvc6-5j66
reference_id GHSA-rj3x-wvc6-5j66
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rj3x-wvc6-5j66
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.46
purl pkg:composer/typo3/cms-core@9.5.46
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.46
1
url pkg:composer/typo3/cms-core@10.4.43
purl pkg:composer/typo3/cms-core@10.4.43
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.43
2
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
3
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
4
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25121, GHSA-rj3x-wvc6-5j66
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-taj6-zj2n-5kg8
20
url VCID-ve7g-8st5-wffb
vulnerability_id VCID-ve7g-8st5-wffb
summary
TYPO3 CMS vulnerable to Denial of Service in Page Error Handling
### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.

This vulnerability is very similar, but not identical, to the one described in [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005) (CVE-2021-21359).

### Solution
Update to TYPO3 versions 9.5.38 ELTS, 10.4.33 or 11.5.20 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-012](https://typo3.org/security/advisory/typo3-core-sa-2022-012)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23500
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54778
published_at 2026-04-02T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54818
published_at 2026-04-09T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54821
published_at 2026-04-08T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.5477
published_at 2026-04-07T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54801
published_at 2026-04-04T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54831
published_at 2026-04-18T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54828
published_at 2026-04-16T12:55:00Z
7
value 0.00317
scoring_system epss
scoring_elements 0.54789
published_at 2026-04-13T12:55:00Z
8
value 0.00317
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-12T12:55:00Z
9
value 0.00317
scoring_system epss
scoring_elements 0.54829
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23500
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23500.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23500.yaml
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a
4
reference_url https://github.com/TYPO3/typo3/commit/73b46b6a627093112cfca4b895a198ca5e1970b7
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/73b46b6a627093112cfca4b895a198ca5e1970b7
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:53:56Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23500
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23500
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-012
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-012
8
reference_url https://github.com/advisories/GHSA-8c28-5mp7-v24h
reference_id GHSA-8c28-5mp7-v24h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8c28-5mp7-v24h
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
aliases CVE-2022-23500, GHSA-8c28-5mp7-v24h, GMS-2022-8130
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ve7g-8st5-wffb
21
url VCID-vyvy-y3cw-hbgr
vulnerability_id VCID-vyvy-y3cw-hbgr
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) is vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php is vulnerable. The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Users are advised to update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.35 LTS, 11.5.23 LTS and 12.2.0 which fix this problem. For users who are unable to patch in a timely manner the TypoScript setting `config.absRefPrefix` should at least be set to a static path value, instead of using auto - e.g. `config.absRefPrefix=/`. This workaround **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24814
reference_id
reference_type
scores
0
value 0.00867
scoring_system epss
scoring_elements 0.75119
published_at 2026-04-07T12:55:00Z
1
value 0.00867
scoring_system epss
scoring_elements 0.75197
published_at 2026-04-18T12:55:00Z
2
value 0.00867
scoring_system epss
scoring_elements 0.7519
published_at 2026-04-16T12:55:00Z
3
value 0.00867
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-11T12:55:00Z
4
value 0.00867
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-12T12:55:00Z
5
value 0.00867
scoring_system epss
scoring_elements 0.75153
published_at 2026-04-13T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-02T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24814
1
reference_url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484
4
reference_url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549
5
reference_url https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-001
7
reference_url https://typo3.org/security/advisory/typo3-psa-2023-001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://typo3.org/security/advisory/typo3-psa-2023-001
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-24814
reference_id CVE-2023-24814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-24814
9
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml
reference_id CVE-2023-24814.YAML
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml
10
reference_url https://github.com/advisories/GHSA-r4f8-f93x-5qh3
reference_id GHSA-r4f8-f93x-5qh3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r4f8-f93x-5qh3
11
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3
reference_id GHSA-r4f8-f93x-5qh3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.40
purl pkg:composer/typo3/cms-core@9.5.40
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.40
1
url pkg:composer/typo3/cms-core@10.4.36
purl pkg:composer/typo3/cms-core@10.4.36
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zn99-ywte-33g6
15
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.36
2
url pkg:composer/typo3/cms-core@11.5.23
purl pkg:composer/typo3/cms-core@11.5.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zn99-ywte-33g6
15
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.23
3
url pkg:composer/typo3/cms-core@12.2.0
purl pkg:composer/typo3/cms-core@12.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.2.0
aliases CVE-2023-24814, GHSA-r4f8-f93x-5qh3
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyvy-y3cw-hbgr
22
url VCID-w13x-3rp9-wyej
vulnerability_id VCID-w13x-3rp9-wyej
summary
TYPO3 CMS vulnerable to Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration
> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.3)

### Problem
Due to the lack of handling user-submitted [YAML placeholder expressions](https://docs.typo3.org/m/typo3/reference-coreapi/main/en-us/Configuration/Yaml/YamlApi.html#custom-placeholder-processing) in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors.

A valid backend user account having administrator privileges is needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### Credits
Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2022-016](https://typo3.org/security/advisory/typo3-core-sa-2022-016)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23504
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54501
published_at 2026-04-08T12:55:00Z
1
value 0.00313
scoring_system epss
scoring_elements 0.5451
published_at 2026-04-18T12:55:00Z
2
value 0.00313
scoring_system epss
scoring_elements 0.54507
published_at 2026-04-16T12:55:00Z
3
value 0.00313
scoring_system epss
scoring_elements 0.54468
published_at 2026-04-13T12:55:00Z
4
value 0.00313
scoring_system epss
scoring_elements 0.54489
published_at 2026-04-12T12:55:00Z
5
value 0.00313
scoring_system epss
scoring_elements 0.54506
published_at 2026-04-11T12:55:00Z
6
value 0.00313
scoring_system epss
scoring_elements 0.54495
published_at 2026-04-09T12:55:00Z
7
value 0.00313
scoring_system epss
scoring_elements 0.54457
published_at 2026-04-02T12:55:00Z
8
value 0.00313
scoring_system epss
scoring_elements 0.5448
published_at 2026-04-04T12:55:00Z
9
value 0.00313
scoring_system epss
scoring_elements 0.54448
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23504
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T19:21:01Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23504
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23504
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-016
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-016
8
reference_url https://github.com/advisories/GHSA-8w3p-qh3x-6gjr
reference_id GHSA-8w3p-qh3x-6gjr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8w3p-qh3x-6gjr
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
3
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23504, GHSA-8w3p-qh3x-6gjr, GMS-2022-8131
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w13x-3rp9-wyej
23
url VCID-xy6y-312d-rygj
vulnerability_id VCID-xy6y-312d-rygj
summary
TYPO3 Potential Open Redirect via Parsing Differences
### Problem
Applications that use `TYPO3\CMS\Core\Http\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.

### Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.

### Credits
Thanks to Sam Mush and Christian Eßl who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2025-002](https://typo3.org/security/advisory/typo3-core-sa-2025-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55892
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40409
published_at 2026-04-04T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40366
published_at 2026-04-18T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.4035
published_at 2026-04-13T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40369
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40407
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40396
published_at 2026-04-16T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40384
published_at 2026-04-08T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40334
published_at 2026-04-07T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40383
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55892
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/a4abf48d254685f43383e6e7f80d48aebaea56af
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/a4abf48d254685f43383e6e7f80d48aebaea56af
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T20:12:41Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-55892
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-55892
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-002
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T20:12:41Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-002
6
reference_url https://github.com/advisories/GHSA-2fx5-pggv-6jjr
reference_id GHSA-2fx5-pggv-6jjr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2fx5-pggv-6jjr
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.49
purl pkg:composer/typo3/cms-core@9.5.49
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.49
1
url pkg:composer/typo3/cms-core@10.4.48
purl pkg:composer/typo3/cms-core@10.4.48
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.48
2
url pkg:composer/typo3/cms-core@11.5.42
purl pkg:composer/typo3/cms-core@11.5.42
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.42
3
url pkg:composer/typo3/cms-core@12.4.25
purl pkg:composer/typo3/cms-core@12.4.25
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.25
4
url pkg:composer/typo3/cms-core@13.4.3
purl pkg:composer/typo3/cms-core@13.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.3
aliases CVE-2024-55892, GHSA-2fx5-pggv-6jjr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xy6y-312d-rygj
24
url VCID-zdq2-dhb2-6kaq
vulnerability_id VCID-zdq2-dhb2-6kaq
summary
TYPO3 CMS vulnerable to Weak Authentication in Frontend Login
### Problem
Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary.

### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-013](https://typo3.org/security/advisory/typo3-core-sa-2022-013)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23501
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45749
published_at 2026-04-08T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.4579
published_at 2026-04-18T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45795
published_at 2026-04-16T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45746
published_at 2026-04-13T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45738
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45768
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45745
published_at 2026-04-09T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45724
published_at 2026-04-02T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45744
published_at 2026-04-04T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45693
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23501
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T18:48:00Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23501
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23501
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-013
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-013
8
reference_url https://github.com/advisories/GHSA-jfp7-79g7-89rf
reference_id GHSA-jfp7-79g7-89rf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jfp7-79g7-89rf
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
3
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23501, GHSA-jfp7-79g7-89rf, GMS-2022-8134
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdq2-dhb2-6kaq
25
url VCID-zn99-ywte-33g6
vulnerability_id VCID-zn99-ywte-33g6
summary
Improper Access Control
TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38499
reference_id
reference_type
scores
0
value 0.02109
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-18T12:55:00Z
1
value 0.02109
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-02T12:55:00Z
2
value 0.02109
scoring_system epss
scoring_elements 0.84066
published_at 2026-04-04T12:55:00Z
3
value 0.02109
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-07T12:55:00Z
4
value 0.02109
scoring_system epss
scoring_elements 0.84091
published_at 2026-04-08T12:55:00Z
5
value 0.02109
scoring_system epss
scoring_elements 0.84097
published_at 2026-04-09T12:55:00Z
6
value 0.02109
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-11T12:55:00Z
7
value 0.02109
scoring_system epss
scoring_elements 0.84108
published_at 2026-04-12T12:55:00Z
8
value 0.02109
scoring_system epss
scoring_elements 0.84104
published_at 2026-04-13T12:55:00Z
9
value 0.02109
scoring_system epss
scoring_elements 0.84126
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38499
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a
3
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-003
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-003
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38499
reference_id CVE-2023-38499
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-38499
5
reference_url https://github.com/advisories/GHSA-jq6g-4v5m-wm9r
reference_id GHSA-jq6g-4v5m-wm9r
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jq6g-4v5m-wm9r
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r
reference_id GHSA-jq6g-4v5m-wm9r
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.42
purl pkg:composer/typo3/cms-core@9.5.42
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.42
1
url pkg:composer/typo3/cms-core@10.4.39
purl pkg:composer/typo3/cms-core@10.4.39
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.39
2
url pkg:composer/typo3/cms-core@11.5.30
purl pkg:composer/typo3/cms-core@11.5.30
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.30
3
url pkg:composer/typo3/cms-core@12.4.4
purl pkg:composer/typo3/cms-core@12.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.4
aliases CVE-2023-38499, GHSA-jq6g-4v5m-wm9r
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn99-ywte-33g6
26
url VCID-zwgt-rm1f-6bf2
vulnerability_id VCID-zwgt-rm1f-6bf2
summary
TYPO3 vulnerable to Cross-Site Scripting in the ShowImageController
### Problem
Failing to properly encode user-controlled values in file entities, the `ShowImageController` (_eID tx_cms_showpic_) is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to file entities.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

### Credits
Thanks to TYPO3 security team member Torben Hansen who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-009](https://typo3.org/security/advisory/typo3-core-sa-2024-009)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34357
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-02T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70421
published_at 2026-04-18T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-16T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70369
published_at 2026-04-13T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70383
published_at 2026-04-12T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70399
published_at 2026-04-11T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70375
published_at 2026-04-09T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-08T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70315
published_at 2026-04-07T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34357
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7
3
reference_url https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee
4
reference_url https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34357
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34357
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-009
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-009
8
reference_url https://github.com/advisories/GHSA-hw6c-6gwq-3m3m
reference_id GHSA-hw6c-6gwq-3m3m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hw6c-6gwq-3m3m
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.48
purl pkg:composer/typo3/cms-core@9.5.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.48
1
url pkg:composer/typo3/cms-core@10.4.45
purl pkg:composer/typo3/cms-core@10.4.45
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.45
2
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
3
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
4
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34357, GHSA-hw6c-6gwq-3m3m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwgt-rm1f-6bf2
Fixing_vulnerabilities
0
url VCID-y32z-2d3f-gkgw
vulnerability_id VCID-y32z-2d3f-gkgw
summary
Cross-site Scripting
TYPO3 is vulnerable to cross-site scripting. Corresponding rendering instructions via TypoScript functionality HTMLparser does not consider all potentially malicious HTML tag & attribute combinations per default. In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32768
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51812
published_at 2026-04-08T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51874
published_at 2026-04-18T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51867
published_at 2026-04-16T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51825
published_at 2026-04-13T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.5184
published_at 2026-04-12T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.5186
published_at 2026-04-11T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51771
published_at 2026-04-02T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51797
published_at 2026-04-04T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51757
published_at 2026-04-07T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51722
published_at 2026-04-01T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51809
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32768
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-32768.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-32768.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-32768.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-32768.yaml
3
reference_url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-c5c9-8c6m-727v
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-c5c9-8c6m-727v
4
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5c9-8c6m-727v
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5c9-8c6m-727v
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2021-013
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2021-013
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32768
reference_id CVE-2021-32768
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-32768
7
reference_url https://github.com/advisories/GHSA-c5c9-8c6m-727v
reference_id GHSA-c5c9-8c6m-727v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c5c9-8c6m-727v
fixed_packages
0
url pkg:composer/typo3/cms-core@7.6.53
purl pkg:composer/typo3/cms-core@7.6.53
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@7.6.53
1
url pkg:composer/typo3/cms-core@8.7.42
purl pkg:composer/typo3/cms-core@8.7.42
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.42
2
url pkg:composer/typo3/cms-core@9.5.29
purl pkg:composer/typo3/cms-core@9.5.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4jpa-6fqh-hbfg
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-5paq-5frf-43ed
3
vulnerability VCID-65ue-7jd9-23gf
4
vulnerability VCID-8d2m-1ffv-jqe1
5
vulnerability VCID-axvk-13qf-tka7
6
vulnerability VCID-b6er-h7dm-3bev
7
vulnerability VCID-bajy-qbwq-fufn
8
vulnerability VCID-e32h-8q61-hbgc
9
vulnerability VCID-g4uc-qeb6-myed
10
vulnerability VCID-gv1b-xtv4-4yg3
11
vulnerability VCID-h6y3-7gsq-skh2
12
vulnerability VCID-mnz3-rj21-67ad
13
vulnerability VCID-mud2-s4rc-fuf6
14
vulnerability VCID-n7ng-zkkb-2qaz
15
vulnerability VCID-nubu-f1sc-gbes
16
vulnerability VCID-remd-55jh-r3g5
17
vulnerability VCID-s55j-8hbt-akhn
18
vulnerability VCID-t1n7-eswt-73gw
19
vulnerability VCID-taj6-zj2n-5kg8
20
vulnerability VCID-ve7g-8st5-wffb
21
vulnerability VCID-vyvy-y3cw-hbgr
22
vulnerability VCID-w13x-3rp9-wyej
23
vulnerability VCID-xy6y-312d-rygj
24
vulnerability VCID-zdq2-dhb2-6kaq
25
vulnerability VCID-zn99-ywte-33g6
26
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.29
3
url pkg:composer/typo3/cms-core@10.4.19
purl pkg:composer/typo3/cms-core@10.4.19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4jpa-6fqh-hbfg
3
vulnerability VCID-4t9s-p25a-cfas
4
vulnerability VCID-5paq-5frf-43ed
5
vulnerability VCID-65ue-7jd9-23gf
6
vulnerability VCID-8d2m-1ffv-jqe1
7
vulnerability VCID-8sdd-b1bn-cuhx
8
vulnerability VCID-av8u-rvzq-4fc7
9
vulnerability VCID-axvk-13qf-tka7
10
vulnerability VCID-b6er-h7dm-3bev
11
vulnerability VCID-bajy-qbwq-fufn
12
vulnerability VCID-e32h-8q61-hbgc
13
vulnerability VCID-g4uc-qeb6-myed
14
vulnerability VCID-gv1b-xtv4-4yg3
15
vulnerability VCID-gyyu-n3b1-zbcj
16
vulnerability VCID-h6y3-7gsq-skh2
17
vulnerability VCID-mnz3-rj21-67ad
18
vulnerability VCID-mud2-s4rc-fuf6
19
vulnerability VCID-n7ng-zkkb-2qaz
20
vulnerability VCID-nubu-f1sc-gbes
21
vulnerability VCID-remd-55jh-r3g5
22
vulnerability VCID-s55j-8hbt-akhn
23
vulnerability VCID-t1n7-eswt-73gw
24
vulnerability VCID-taj6-zj2n-5kg8
25
vulnerability VCID-ve7g-8st5-wffb
26
vulnerability VCID-vwb2-a84s-5qak
27
vulnerability VCID-vyvy-y3cw-hbgr
28
vulnerability VCID-w13x-3rp9-wyej
29
vulnerability VCID-xy6y-312d-rygj
30
vulnerability VCID-zdq2-dhb2-6kaq
31
vulnerability VCID-zn99-ywte-33g6
32
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.19
4
url pkg:composer/typo3/cms-core@11.3.2
purl pkg:composer/typo3/cms-core@11.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-1yxw-saf5-wue7
2
vulnerability VCID-4jpa-6fqh-hbfg
3
vulnerability VCID-4t9s-p25a-cfas
4
vulnerability VCID-5paq-5frf-43ed
5
vulnerability VCID-65ue-7jd9-23gf
6
vulnerability VCID-8d2m-1ffv-jqe1
7
vulnerability VCID-8sdd-b1bn-cuhx
8
vulnerability VCID-av8u-rvzq-4fc7
9
vulnerability VCID-axvk-13qf-tka7
10
vulnerability VCID-b6er-h7dm-3bev
11
vulnerability VCID-bajy-qbwq-fufn
12
vulnerability VCID-e32h-8q61-hbgc
13
vulnerability VCID-g4uc-qeb6-myed
14
vulnerability VCID-gv1b-xtv4-4yg3
15
vulnerability VCID-gyyu-n3b1-zbcj
16
vulnerability VCID-h6y3-7gsq-skh2
17
vulnerability VCID-jjbn-6efk-nud2
18
vulnerability VCID-mnz3-rj21-67ad
19
vulnerability VCID-mud2-s4rc-fuf6
20
vulnerability VCID-n7ng-zkkb-2qaz
21
vulnerability VCID-nubu-f1sc-gbes
22
vulnerability VCID-remd-55jh-r3g5
23
vulnerability VCID-s55j-8hbt-akhn
24
vulnerability VCID-t1n7-eswt-73gw
25
vulnerability VCID-taj6-zj2n-5kg8
26
vulnerability VCID-uyeu-a3xr-fkh4
27
vulnerability VCID-ve7g-8st5-wffb
28
vulnerability VCID-vwb2-a84s-5qak
29
vulnerability VCID-vyvy-y3cw-hbgr
30
vulnerability VCID-w13x-3rp9-wyej
31
vulnerability VCID-xy6y-312d-rygj
32
vulnerability VCID-zdq2-dhb2-6kaq
33
vulnerability VCID-zn99-ywte-33g6
34
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.3.2
aliases CVE-2021-32768, GHSA-c5c9-8c6m-727v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32z-2d3f-gkgw
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.29