Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-core@14.0.2
Typecomposer
Namespacetypo3
Namecms-core
Version14.0.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-gyyu-n3b1-zbcj
vulnerability_id VCID-gyyu-n3b1-zbcj
summary
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool
### Problem
Local platform users who can write to TYPO3’s mail‑file spool directory can craft a file that the system will automatically deserialize without any class restrictions. This flaw allows an attacker to inject and execute arbitrary PHP code in the public scope of the web server.

The vulnerability is triggered when TYPO3 is configured with `$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_type'] = 'file';` and a scheduler task or cron job runs the command `mailer:spool:send`. The spool‑send operation performs the insecure deserialization that is at the core of this issue.

### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.

### Credits
Thanks to Vitaly Simonovich for reporting this issue, and to TYPO3 security team members Elias Häußler and Oliver Hader for fixing it.

### References
* [TYPO3-CORE-SA-2026-004](https://typo3.org/security/advisory/typo3-core-sa-2026-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0813
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-08T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0812
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08174
published_at 2026-04-04T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11696
published_at 2026-04-12T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11732
published_at 2026-04-11T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11721
published_at 2026-04-09T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.1153
published_at 2026-04-18T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11527
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1167
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
3
reference_url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
4
reference_url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2026-004
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://typo3.org/security/advisory/typo3-core-sa-2026-004
8
reference_url https://github.com/advisories/GHSA-7vp9-x248-9vr9
reference_id GHSA-7vp9-x248-9vr9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vp9-x248-9vr9
fixed_packages
0
url pkg:composer/typo3/cms-core@10.4.55
purl pkg:composer/typo3/cms-core@10.4.55
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.55
1
url pkg:composer/typo3/cms-core@11.5.49
purl pkg:composer/typo3/cms-core@11.5.49
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.49
2
url pkg:composer/typo3/cms-core@12.4.41
purl pkg:composer/typo3/cms-core@12.4.41
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.41
3
url pkg:composer/typo3/cms-core@13.4.23
purl pkg:composer/typo3/cms-core@13.4.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.23
4
url pkg:composer/typo3/cms-core@14.0.2
purl pkg:composer/typo3/cms-core@14.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@14.0.2
aliases CVE-2026-0859, GHSA-7vp9-x248-9vr9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyyu-n3b1-zbcj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@14.0.2