Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-core@12.4.37
Typecomposer
Namespacetypo3
Namecms-core
Version12.4.37
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.41
Latest_non_vulnerable_version14.0.2
Affected_by_vulnerabilities
0
url VCID-gyyu-n3b1-zbcj
vulnerability_id VCID-gyyu-n3b1-zbcj
summary
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool
### Problem
Local platform users who can write to TYPO3’s mail‑file spool directory can craft a file that the system will automatically deserialize without any class restrictions. This flaw allows an attacker to inject and execute arbitrary PHP code in the public scope of the web server.

The vulnerability is triggered when TYPO3 is configured with `$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_type'] = 'file';` and a scheduler task or cron job runs the command `mailer:spool:send`. The spool‑send operation performs the insecure deserialization that is at the core of this issue.

### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.

### Credits
Thanks to Vitaly Simonovich for reporting this issue, and to TYPO3 security team members Elias Häußler and Oliver Hader for fixing it.

### References
* [TYPO3-CORE-SA-2026-004](https://typo3.org/security/advisory/typo3-core-sa-2026-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0813
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-08T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0812
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08174
published_at 2026-04-04T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.1167
published_at 2026-04-13T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11696
published_at 2026-04-12T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11732
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11721
published_at 2026-04-09T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11654
published_at 2026-04-21T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1153
published_at 2026-04-18T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11527
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
3
reference_url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
4
reference_url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2026-004
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://typo3.org/security/advisory/typo3-core-sa-2026-004
8
reference_url https://github.com/advisories/GHSA-7vp9-x248-9vr9
reference_id GHSA-7vp9-x248-9vr9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vp9-x248-9vr9
fixed_packages
0
url pkg:composer/typo3/cms-core@12.4.41
purl pkg:composer/typo3/cms-core@12.4.41
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.41
1
url pkg:composer/typo3/cms-core@13.4.23
purl pkg:composer/typo3/cms-core@13.4.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.23
2
url pkg:composer/typo3/cms-core@14.0.2
purl pkg:composer/typo3/cms-core@14.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@14.0.2
aliases CVE-2026-0859, GHSA-7vp9-x248-9vr9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyyu-n3b1-zbcj
Fixing_vulnerabilities
0
url VCID-jxw7-skw6-q7bg
vulnerability_id VCID-jxw7-skw6-q7bg
summary
TYPO3 CMS uses insufficient entropy when generating passwords
A deterministic three‑character prefix in the Password Generation component of TYPO3 CMS versions 12.0.0–12.4.36 and 13.0.0–13.4.17 reduces entropy, allowing attackers to carry out brute‑force attacks more quickly.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59015
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09796
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09847
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10165
published_at 2026-04-21T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10057
published_at 2026-04-16T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10034
published_at 2026-04-18T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10651
published_at 2026-04-07T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10766
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10799
published_at 2026-04-11T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10784
published_at 2026-04-09T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10728
published_at 2026-04-08T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10742
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59015
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/d2057cc7b2c2db417a2af38c30cb9da42302ab70
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/d2057cc7b2c2db417a2af38c30cb9da42302ab70
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59015
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59015
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-019
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-09T19:31:01Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-019
5
reference_url https://github.com/advisories/GHSA-p5jq-5383-qvc7
reference_id GHSA-p5jq-5383-qvc7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p5jq-5383-qvc7
fixed_packages
0
url pkg:composer/typo3/cms-core@12.4.37
purl pkg:composer/typo3/cms-core@12.4.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.37
1
url pkg:composer/typo3/cms-core@13.4.18
purl pkg:composer/typo3/cms-core@13.4.18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.18
aliases CVE-2025-59015, GHSA-p5jq-5383-qvc7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxw7-skw6-q7bg
1
url VCID-qeus-f4wj-rubr
vulnerability_id VCID-qeus-f4wj-rubr
summary
TYPO3 CMS exposes sensitive information in an error message
Error messages containing sensitive information in the File Abstraction Layer in TYPO3 CMS versions 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, and 13.0.0-13.4.17 allow backend users to disclose full file paths via failed low-level file-system operations.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59016
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12991
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13175
published_at 2026-04-21T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13081
published_at 2026-04-16T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.1308
published_at 2026-04-18T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13819
published_at 2026-04-07T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13827
published_at 2026-04-13T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13875
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13911
published_at 2026-04-11T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13954
published_at 2026-04-09T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13902
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59016
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/e1e4380a2d8e72228c597403f0463c21d6e1b8d9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/e1e4380a2d8e72228c597403f0463c21d6e1b8d9
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59016
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59016
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-020
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-09T19:30:29Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-020
5
reference_url https://github.com/advisories/GHSA-cvm2-5f78-g9m8
reference_id GHSA-cvm2-5f78-g9m8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cvm2-5f78-g9m8
fixed_packages
0
url pkg:composer/typo3/cms-core@12.4.37
purl pkg:composer/typo3/cms-core@12.4.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.37
1
url pkg:composer/typo3/cms-core@13.4.18
purl pkg:composer/typo3/cms-core@13.4.18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.18
aliases CVE-2025-59016, GHSA-cvm2-5f78-g9m8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qeus-f4wj-rubr
2
url VCID-qzyk-7877-27a3
vulnerability_id VCID-qzyk-7877-27a3
summary
TYPO3 CMS has an open‑redirect vulnerability
An open‑redirect vulnerability in GeneralUtility::sanitizeLocalUrl of TYPO3 CMS 9.0.0–9.5.54, 10.0.0–10.4.53, 11.0.0–11.5.47, 12.0.0–12.4.36, and 13.0.0–13.4.17 allows an attacker to redirect users to arbitrary external sites, enabling phishing attacks by supplying a manipulated, sanitized URL.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59013
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09718
published_at 2026-04-21T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09358
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09409
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.096
published_at 2026-04-16T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09571
published_at 2026-04-18T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10215
published_at 2026-04-07T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10339
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.1038
published_at 2026-04-11T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10318
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.1035
published_at 2026-04-09T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10288
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59013
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/862b9da870815132c31119cd85bc454a5010793c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/862b9da870815132c31119cd85bc454a5010793c
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59013
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59013
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-017
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-09T19:31:48Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-017
5
reference_url https://github.com/advisories/GHSA-72jf-5fg5-3cw3
reference_id GHSA-72jf-5fg5-3cw3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-72jf-5fg5-3cw3
fixed_packages
0
url pkg:composer/typo3/cms-core@12.4.37
purl pkg:composer/typo3/cms-core@12.4.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.37
1
url pkg:composer/typo3/cms-core@13.4.18
purl pkg:composer/typo3/cms-core@13.4.18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.18
aliases CVE-2025-59013, GHSA-72jf-5fg5-3cw3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzyk-7877-27a3
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.37