Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/55769?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/55769?format=api", "purl": "pkg:composer/typo3/cms-core@8.7.0", "type": "composer", "namespace": "typo3", "name": "cms-core", "version": "8.7.0", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "12.4.41", "latest_non_vulnerable_version": "14.0.2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33457?format=api", "vulnerability_id": "VCID-a49c-fqrj-nbb3", "summary": "Cleartext storage of session identifier\nUser session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.\n\n### Solution\nUpdate to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.\n\n### Credits\nThanks to TYPO3 security team member Helmut Hummel who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader as well as TYPO3 contributor Markus Klein who fixed the issue.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39249", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39336", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.3933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.3937", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39341", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39372", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26228" }, { "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-26228.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-26228.yaml" }, { "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-26228.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-26228.yaml" }, { "reference_url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26228", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26228" }, { "reference_url": "https://typo3.org/security/advisory/typo3-core-sa-2020-011", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2020-011" }, { "reference_url": "https://github.com/advisories/GHSA-954j-f27r-cj52", "reference_id": "GHSA-954j-f27r-cj52", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-954j-f27r-cj52" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73048?format=api", "purl": "pkg:composer/typo3/cms-core@8.7.38", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.38" }, { "url": "http://public2.vulnerablecode.io/api/packages/73046?format=api", "purl": "pkg:composer/typo3/cms-core@9.5.23", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jpa-6fqh-hbfg" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-5jgb-dsyx-hyb4" }, { "vulnerability": "VCID-5paq-5frf-43ed" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-6a9t-8dmn-s3bv" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-b6er-h7dm-3bev" }, { "vulnerability": "VCID-bajy-qbwq-fufn" }, { "vulnerability": "VCID-d8d1-sat6-muhe" }, { "vulnerability": "VCID-dsu7-jjjq-f3e1" }, { "vulnerability": "VCID-e32h-8q61-hbgc" }, { "vulnerability": "VCID-ekfd-wp8z-d7e1" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-he5m-6wj4-rbhc" }, { "vulnerability": "VCID-mnz3-rj21-67ad" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n15v-ta9h-6ffb" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-remd-55jh-r3g5" }, { "vulnerability": "VCID-s55j-8hbt-akhn" }, { "vulnerability": "VCID-s64f-x81f-b7ce" }, { "vulnerability": "VCID-t1n7-eswt-73gw" }, { "vulnerability": "VCID-t3jn-vwbx-u7cr" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-ve7g-8st5-wffb" }, { "vulnerability": "VCID-vyvy-y3cw-hbgr" }, { "vulnerability": "VCID-w13x-3rp9-wyej" }, { "vulnerability": "VCID-xh7y-56vy-5ud8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-y32z-2d3f-gkgw" }, { "vulnerability": "VCID-zdq2-dhb2-6kaq" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.23" }, { "url": "http://public2.vulnerablecode.io/api/packages/73047?format=api", "purl": "pkg:composer/typo3/cms-core@10.4.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1r9g-c5rn-ukgb" }, { "vulnerability": "VCID-1yxw-saf5-wue7" }, { "vulnerability": "VCID-4jpa-6fqh-hbfg" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-5jgb-dsyx-hyb4" }, { "vulnerability": "VCID-5paq-5frf-43ed" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-6a9t-8dmn-s3bv" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-8sdd-b1bn-cuhx" }, { "vulnerability": "VCID-a89c-jvwa-6kh5" }, { "vulnerability": "VCID-av8u-rvzq-4fc7" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-b6er-h7dm-3bev" }, { "vulnerability": "VCID-bajy-qbwq-fufn" }, { "vulnerability": "VCID-d8d1-sat6-muhe" }, { "vulnerability": "VCID-dhrm-uxuv-zfaj" }, { "vulnerability": "VCID-dsu7-jjjq-f3e1" }, { "vulnerability": "VCID-e32h-8q61-hbgc" }, { "vulnerability": "VCID-ekfd-wp8z-d7e1" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-gyyu-n3b1-zbcj" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-he5m-6wj4-rbhc" }, { "vulnerability": "VCID-mnz3-rj21-67ad" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n15v-ta9h-6ffb" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-remd-55jh-r3g5" }, { "vulnerability": "VCID-s55j-8hbt-akhn" }, { "vulnerability": "VCID-s64f-x81f-b7ce" }, { "vulnerability": "VCID-t1n7-eswt-73gw" }, { "vulnerability": "VCID-t3jn-vwbx-u7cr" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-ve7g-8st5-wffb" }, { "vulnerability": "VCID-vwb2-a84s-5qak" }, { "vulnerability": "VCID-vyvy-y3cw-hbgr" }, { "vulnerability": "VCID-w13x-3rp9-wyej" }, { "vulnerability": "VCID-xh7y-56vy-5ud8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-y32z-2d3f-gkgw" }, { "vulnerability": "VCID-zdq2-dhb2-6kaq" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.10" } ], "aliases": [ "CVE-2020-26228", "GHSA-954j-f27r-cj52" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a49c-fqrj-nbb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33212?format=api", "vulnerability_id": "VCID-f963-qur3-2qb7", "summary": "Cross-Site Scripting in Fluid view helpers\n> ### Meta\n> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)\n> * CWE-79\n\n### Problem\nIt has been discovered that system extension Fluid (`typo3/cms-fluid`) of the TYPO3 core is vulnerable to cross-site scripting passing user-controlled data as argument to Fluid view helpers.\n\n```\n<f:form ... fieldNamePrefix=\"{payload}\" />\n<f:be.labels.csh ... label=\"{payload}\" />\n<f:be.menus.actionMenu ... label=\"{payload}\" />\n```\n\n### Solution\nUpdate to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described.\n\n### Credits\nThanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 security team members Helmut Hummel & Oliver Hader who fixed the issue.\n\n### References\n* [TYPO3-CORE-SA-2020-010](https://typo3.org/security/advisory/typo3-core-sa-2020-010)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26227", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58115", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58139", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.57999", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58079", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58153", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26227" }, { "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-26227.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-26227.yaml" }, { "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-26227.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-26227.yaml" }, { "reference_url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-vqqx-jw6p-q3rf", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-vqqx-jw6p-q3rf" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26227", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26227" }, { "reference_url": "https://packagist.org/packages/typo3/cms-core", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://packagist.org/packages/typo3/cms-core" }, { "reference_url": "https://typo3.org/security/advisory/typo3-core-sa-2020-010", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2020-010" }, { "reference_url": "https://github.com/advisories/GHSA-vqqx-jw6p-q3rf", "reference_id": "GHSA-vqqx-jw6p-q3rf", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-vqqx-jw6p-q3rf" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73048?format=api", "purl": "pkg:composer/typo3/cms-core@8.7.38", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.38" }, { "url": "http://public2.vulnerablecode.io/api/packages/73046?format=api", "purl": "pkg:composer/typo3/cms-core@9.5.23", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4jpa-6fqh-hbfg" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-5jgb-dsyx-hyb4" }, { "vulnerability": "VCID-5paq-5frf-43ed" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-6a9t-8dmn-s3bv" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-b6er-h7dm-3bev" }, { "vulnerability": "VCID-bajy-qbwq-fufn" }, { "vulnerability": "VCID-d8d1-sat6-muhe" }, { "vulnerability": "VCID-dsu7-jjjq-f3e1" }, { "vulnerability": "VCID-e32h-8q61-hbgc" }, { "vulnerability": "VCID-ekfd-wp8z-d7e1" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-he5m-6wj4-rbhc" }, { "vulnerability": "VCID-mnz3-rj21-67ad" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n15v-ta9h-6ffb" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-remd-55jh-r3g5" }, { "vulnerability": "VCID-s55j-8hbt-akhn" }, { "vulnerability": "VCID-s64f-x81f-b7ce" }, { "vulnerability": "VCID-t1n7-eswt-73gw" }, { "vulnerability": "VCID-t3jn-vwbx-u7cr" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-ve7g-8st5-wffb" }, { "vulnerability": "VCID-vyvy-y3cw-hbgr" }, { "vulnerability": "VCID-w13x-3rp9-wyej" }, { "vulnerability": "VCID-xh7y-56vy-5ud8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-y32z-2d3f-gkgw" }, { "vulnerability": "VCID-zdq2-dhb2-6kaq" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.23" }, { "url": "http://public2.vulnerablecode.io/api/packages/73047?format=api", "purl": "pkg:composer/typo3/cms-core@10.4.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1r9g-c5rn-ukgb" }, { "vulnerability": "VCID-1yxw-saf5-wue7" }, { "vulnerability": "VCID-4jpa-6fqh-hbfg" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-5jgb-dsyx-hyb4" }, { "vulnerability": "VCID-5paq-5frf-43ed" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-6a9t-8dmn-s3bv" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-8sdd-b1bn-cuhx" }, { "vulnerability": "VCID-a89c-jvwa-6kh5" }, { "vulnerability": "VCID-av8u-rvzq-4fc7" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-b6er-h7dm-3bev" }, { "vulnerability": "VCID-bajy-qbwq-fufn" }, { "vulnerability": "VCID-d8d1-sat6-muhe" }, { "vulnerability": "VCID-dhrm-uxuv-zfaj" }, { "vulnerability": "VCID-dsu7-jjjq-f3e1" }, { "vulnerability": "VCID-e32h-8q61-hbgc" }, { "vulnerability": "VCID-ekfd-wp8z-d7e1" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-gyyu-n3b1-zbcj" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-he5m-6wj4-rbhc" }, { "vulnerability": "VCID-mnz3-rj21-67ad" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n15v-ta9h-6ffb" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-remd-55jh-r3g5" }, { "vulnerability": "VCID-s55j-8hbt-akhn" }, { "vulnerability": "VCID-s64f-x81f-b7ce" }, { "vulnerability": "VCID-t1n7-eswt-73gw" }, { "vulnerability": "VCID-t3jn-vwbx-u7cr" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-ve7g-8st5-wffb" }, { "vulnerability": "VCID-vwb2-a84s-5qak" }, { "vulnerability": "VCID-vyvy-y3cw-hbgr" }, { "vulnerability": "VCID-w13x-3rp9-wyej" }, { "vulnerability": "VCID-xh7y-56vy-5ud8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-y32z-2d3f-gkgw" }, { "vulnerability": "VCID-zdq2-dhb2-6kaq" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.10" } ], "aliases": [ "CVE-2020-26227", "GHSA-vqqx-jw6p-q3rf" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f963-qur3-2qb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16366?format=api", "vulnerability_id": "VCID-vyvy-y3cw-hbgr", "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nTYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) is vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php is vulnerable. The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Users are advised to update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.35 LTS, 11.5.23 LTS and 12.2.0 which fix this problem. For users who are unable to patch in a timely manner the TypoScript setting `config.absRefPrefix` should at least be set to a static path value, instead of using auto - e.g. `config.absRefPrefix=/`. This workaround **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.7519", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75165", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00867", "scoring_system": "epss", "scoring_elements": "0.75153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.77713", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01074", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24814" }, { "reference_url": "https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix" }, { "reference_url": "https://github.com/TYPO3/typo3", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/TYPO3/typo3" }, { "reference_url": "https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484" }, { "reference_url": "https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549" }, { "reference_url": "https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a" }, { "reference_url": "https://typo3.org/security/advisory/typo3-core-sa-2023-001", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2023-001" }, { "reference_url": "https://typo3.org/security/advisory/typo3-psa-2023-001", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://typo3.org/security/advisory/typo3-psa-2023-001" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24814", "reference_id": "CVE-2023-24814", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24814" }, { "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml", "reference_id": "CVE-2023-24814.YAML", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml" }, { "reference_url": "https://github.com/advisories/GHSA-r4f8-f93x-5qh3", "reference_id": "GHSA-r4f8-f93x-5qh3", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-r4f8-f93x-5qh3" }, { "reference_url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3", "reference_id": "GHSA-r4f8-f93x-5qh3", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/" } ], "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71676?format=api", "purl": "pkg:composer/typo3/cms-core@8.7.51", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.51" }, { "url": "http://public2.vulnerablecode.io/api/packages/71675?format=api", "purl": "pkg:composer/typo3/cms-core@9.5.40", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.40" }, { "url": "http://public2.vulnerablecode.io/api/packages/55772?format=api", "purl": "pkg:composer/typo3/cms-core@10.4.36", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1r9g-c5rn-ukgb" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-gyyu-n3b1-zbcj" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.36" }, { "url": "http://public2.vulnerablecode.io/api/packages/55773?format=api", "purl": "pkg:composer/typo3/cms-core@11.5.23", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1r9g-c5rn-ukgb" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-gyyu-n3b1-zbcj" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.23" }, { "url": "http://public2.vulnerablecode.io/api/packages/55774?format=api", "purl": "pkg:composer/typo3/cms-core@12.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1r9g-c5rn-ukgb" }, { "vulnerability": "VCID-4t9s-p25a-cfas" }, { "vulnerability": "VCID-65ue-7jd9-23gf" }, { "vulnerability": "VCID-8d2m-1ffv-jqe1" }, { "vulnerability": "VCID-axvk-13qf-tka7" }, { "vulnerability": "VCID-g4uc-qeb6-myed" }, { "vulnerability": "VCID-gv1b-xtv4-4yg3" }, { "vulnerability": "VCID-gyyu-n3b1-zbcj" }, { "vulnerability": "VCID-h6y3-7gsq-skh2" }, { "vulnerability": "VCID-jxw7-skw6-q7bg" }, { "vulnerability": "VCID-mud2-s4rc-fuf6" }, { "vulnerability": "VCID-n7ng-zkkb-2qaz" }, { "vulnerability": "VCID-nubu-f1sc-gbes" }, { "vulnerability": "VCID-taj6-zj2n-5kg8" }, { "vulnerability": "VCID-xy6y-312d-rygj" }, { "vulnerability": "VCID-zn99-ywte-33g6" }, { "vulnerability": "VCID-zwgt-rm1f-6bf2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.2.0" } ], "aliases": [ "CVE-2023-24814", "GHSA-r4f8-f93x-5qh3" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyvy-y3cw-hbgr" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.0" }