Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-core@11.5.20
Typecomposer
Namespacetypo3
Namecms-core
Version11.5.20
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.41
Latest_non_vulnerable_version14.0.2
Affected_by_vulnerabilities
0
url VCID-1r9g-c5rn-ukgb
vulnerability_id VCID-1r9g-c5rn-ukgb
summary
TYPO3 Allows Privilege Escalation to System Maintainer
### Problem
Administrator-level backend users without system maintainer privileges can escalate their privileges and gain system maintainer access. Exploiting this vulnerability requires a valid administrator account.

### Solution
Update to TYPO3 versions 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

### Credits
Thanks to Alexander Künzl for reporting this issue, and to TYPO3 core & security team member Oliver Hader for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47940
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54701
published_at 2026-04-02T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54757
published_at 2026-04-18T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54716
published_at 2026-04-13T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54738
published_at 2026-04-12T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54754
published_at 2026-04-16T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-09T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54746
published_at 2026-04-08T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54694
published_at 2026-04-07T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54724
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47940
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/a659cc8c0ae05c44dd7f01d13629cdd2d0b7219b
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/a659cc8c0ae05c44dd7f01d13629cdd2d0b7219b
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-6frx-j292-c844
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T14:35:19Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-6frx-j292-c844
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47940
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47940
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-016
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T14:35:19Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-016
6
reference_url https://github.com/advisories/GHSA-6frx-j292-c844
reference_id GHSA-6frx-j292-c844
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6frx-j292-c844
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
1
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
2
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47940, GHSA-6frx-j292-c844
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1r9g-c5rn-ukgb
1
url VCID-4t9s-p25a-cfas
vulnerability_id VCID-4t9s-p25a-cfas
summary
TYPO3 Allows Unrestricted File Upload in File Abstraction Layer
### Problem
By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., `.exe` files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a `.png` extension but actually carrying the MIME type `application/zip`).

Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> The mitigation strategies outlined below apply broadly to all file uploads handled through TYPO3's File Abstraction Layer (FAL), not just those performed via the backend interface. This means that any extension or custom integration leveraging FAL will also be subject to the new validation rules and configuration options. Developers are advised to review the implications for their code and refer to the [documentation of that change](https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/12.4.x/Important-106240-EnforceFile-extensionsAndMime-typeConsistencyInFileAbstractionLayer.html) for guidance.

> [!IMPORTANT]
>
> **Strong security defaults - Manual actions required**
> 
> These versions introduce new configuration options to better control which files are permitted for upload and to improve consistency checks.
> 
> A new configuration option, `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']`, has been added. This option allows administrators to explicitly define which file extensions should be permitted that are not already part of the built-in text or media file groups - examples include archive formats such as `zip` or `xz`.
> 
> In addition, two new feature flags have been introduced to enhance security:
> * `security.system.enforceAllowedFileExtensions`, enforces the defined list of allowed file extensions. This flag is enabled by default in new TYPO3 installations, but remains disabled in existing installations to prevent breaking changes.
> * `security.system.enforceFileExtensionMimeTypeConsistency`, ensures that the uploaded file’s extension matches its actual MIME type, providing further validation of file integrity. This flag is active by default.
> 
> It is recommended to configure the allowed file extensions via `$GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext']` and to enable the feature flag `security.system.enforceAllowedFileExtensions` to enforce the restriction.

### Credits
Thanks to Hamed Kohi for reporting this issue, and to TYPO3 core & security team member Oliver Hader for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32405
published_at 2026-04-02T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32294
published_at 2026-04-18T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32281
published_at 2026-04-13T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32309
published_at 2026-04-12T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32347
published_at 2026-04-11T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32346
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-16T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32268
published_at 2026-04-07T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32442
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47939
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/c265beed6e2c01817c534a226e80e593400f8255
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-9hq9-cr36-4wpj
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47939
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-014
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T14:08:07Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-014
6
reference_url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
reference_id GHSA-9hq9-cr36-4wpj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9hq9-cr36-4wpj
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
1
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
2
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47939, GHSA-9hq9-cr36-4wpj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4t9s-p25a-cfas
2
url VCID-65ue-7jd9-23gf
vulnerability_id VCID-65ue-7jd9-23gf
summary
TYPO3 Unverified Password Change for Backend Users
### Problem
The backend user management interface allows password changes without requiring the current password. When an administrator updates their own account or modifies other user accounts via the admin interface, the current password is not requested for verification.

This behavior may lower the protection against unauthorized access in scenarios where an admin session is hijacked or left unattended, as it enables password changes without additional authentication.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

> [!NOTE]
> In these versions, administrators are required to verify their identity through step-up authentication (also known as sudo mode) when changing backend user passwords.

### Credits
Thanks to the National Cyber Security Center (NCSC) of Switzerland for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36689
published_at 2026-04-02T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36606
published_at 2026-04-18T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36623
published_at 2026-04-16T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36577
published_at 2026-04-13T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36559
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36721
published_at 2026-04-04T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.3661
published_at 2026-04-08T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-09T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36636
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47938
1
reference_url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core/commit/b9a8bcb614ecdd42aa27e1c430c6213d6b6b20b3
2
reference_url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/setup/commit/60572dd050d8d861921889a19599bfe045fed5fd
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3jrg-97f3-rqh9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47938
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-013
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:56:18Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-013
6
reference_url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
reference_id GHSA-3jrg-97f3-rqh9
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3jrg-97f3-rqh9
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
1
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
2
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47938, GHSA-3jrg-97f3-rqh9
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65ue-7jd9-23gf
3
url VCID-8d2m-1ffv-jqe1
vulnerability_id VCID-8d2m-1ffv-jqe1
summary
TYPO3 vulnerable to Cross-Site Scripting in the Form Manager Module
### Problem
The form manager backend module is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to the form module.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

### Credits
Thanks to TYPO3 core & security team member Benjamin Franzke who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2024-008](https://typo3.org/security/advisory/typo3-core-sa-2024-008)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34356
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-02T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70421
published_at 2026-04-18T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-16T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70369
published_at 2026-04-13T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70383
published_at 2026-04-12T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70399
published_at 2026-04-11T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70375
published_at 2026-04-09T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-08T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70315
published_at 2026-04-07T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34356
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156
3
reference_url https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5
4
reference_url https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34356
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34356
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-008
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T15:21:11Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-008
8
reference_url https://github.com/advisories/GHSA-v6mw-h7w6-59w3
reference_id GHSA-v6mw-h7w6-59w3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v6mw-h7w6-59w3
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
1
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
2
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34356, GHSA-v6mw-h7w6-59w3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8d2m-1ffv-jqe1
4
url VCID-axvk-13qf-tka7
vulnerability_id VCID-axvk-13qf-tka7
summary
TYPO3 Install Tool vulnerable to Code Execution
### Problem
Several settings in the Install Tool for configuring the path to system binaries were vulnerable to code execution. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions.

The corresponding change for this advisory involves enforcing the known disadvantages described in [TYPO3-PSA-2020-002: Protecting Install Tool with Sudo Mode](https://typo3.org/security/advisory/typo3-psa-2020-002).

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to Rickmer Frier & Daniel Jonka who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-002](https://typo3.org/security/advisory/typo3-core-sa-2024-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22188
reference_id
reference_type
scores
0
value 0.00687
scoring_system epss
scoring_elements 0.71704
published_at 2026-04-08T12:55:00Z
1
value 0.00687
scoring_system epss
scoring_elements 0.71753
published_at 2026-04-18T12:55:00Z
2
value 0.00687
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-16T12:55:00Z
3
value 0.00687
scoring_system epss
scoring_elements 0.71703
published_at 2026-04-13T12:55:00Z
4
value 0.00687
scoring_system epss
scoring_elements 0.71721
published_at 2026-04-12T12:55:00Z
5
value 0.00687
scoring_system epss
scoring_elements 0.71738
published_at 2026-04-11T12:55:00Z
6
value 0.00687
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-09T12:55:00Z
7
value 0.00687
scoring_system epss
scoring_elements 0.71692
published_at 2026-04-04T12:55:00Z
8
value 0.00687
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-07T12:55:00Z
9
value 0.00687
scoring_system epss
scoring_elements 0.71674
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22188
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/47e897f8c7668ef299ecc9ce93f52cafbb3497ed
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/47e897f8c7668ef299ecc9ce93f52cafbb3497ed
3
reference_url https://github.com/TYPO3/typo3/commit/6cc11761b8e2434fa4ccc9f096c65ca82569cfdf
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/6cc11761b8e2434fa4ccc9f096c65ca82569cfdf
4
reference_url https://github.com/TYPO3/typo3/commit/84e07e35b880a544b517868432c56987d05d46d4
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/84e07e35b880a544b517868432c56987d05d46d4
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-5w2h-59j3-8x5w
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T16:17:44Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-5w2h-59j3-8x5w
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22188
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22188
7
reference_url https://typo3.org/help/security-advisories
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/help/security-advisories
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-002
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-05T16:17:44Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-002
9
reference_url https://typo3.org/security/advisory/typo3-psa-2020-002
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-psa-2020-002
10
reference_url https://github.com/advisories/GHSA-5w2h-59j3-8x5w
reference_id GHSA-5w2h-59j3-8x5w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5w2h-59j3-8x5w
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
1
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
2
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-22188, GHSA-5w2h-59j3-8x5w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axvk-13qf-tka7
5
url VCID-g4uc-qeb6-myed
vulnerability_id VCID-g4uc-qeb6-myed
summary
TYPO3 Install Tool vulnerable to Information Disclosure of Encryption Key
### Problem
The plaintext value of `$GLOBALS['SYS']['encryptionKey']` was displayed in the editing forms of the TYPO3 Install Tool user interface. This allowed attackers to utilize the value to generate cryptographic hashes used for verifying the authenticity of HTTP request parameters. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-004](https://typo3.org/security/advisory/typo3-core-sa-2024-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25119
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52471
published_at 2026-04-02T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-18T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52569
published_at 2026-04-16T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-13T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-12T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52562
published_at 2026-04-11T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52511
published_at 2026-04-09T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52517
published_at 2026-04-08T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52464
published_at 2026-04-07T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52498
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25119
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/14d101359c71ee963cf51ad0c8ae777b7b9ec9a1
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/14d101359c71ee963cf51ad0c8ae777b7b9ec9a1
3
reference_url https://github.com/TYPO3/typo3/commit/df486372ea56fac241d3c96ad43a7729fee64557
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/df486372ea56fac241d3c96ad43a7729fee64557
4
reference_url https://github.com/TYPO3/typo3/commit/fa12667c046342ebfd9b159c646aeafdbc52fcfd
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/fa12667c046342ebfd9b159c646aeafdbc52fcfd
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-h47m-3f78-qp9g
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:01:19Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-h47m-3f78-qp9g
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25119
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25119
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-004
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:01:19Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-004
8
reference_url https://github.com/advisories/GHSA-h47m-3f78-qp9g
reference_id GHSA-h47m-3f78-qp9g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h47m-3f78-qp9g
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
1
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
2
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25119, GHSA-h47m-3f78-qp9g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4uc-qeb6-myed
6
url VCID-gv1b-xtv4-4yg3
vulnerability_id VCID-gv1b-xtv4-4yg3
summary
TYPO3 Backend Forms vulnerable to Information Disclosure of Hashed Passwords
### Problem
Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using brute force techniques. Exploiting this vulnerability requires a valid backend user account.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to the TYPO3 framework merger Christian Kuhn and external security researchers Maximilian Beckmann, Klaus-Günther Schmidt who reported this issue, and TYPO3 security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-003](https://typo3.org/security/advisory/typo3-core-sa-2024-003)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25118
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66278
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66361
published_at 2026-04-18T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66346
published_at 2026-04-16T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66311
published_at 2026-04-13T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66342
published_at 2026-04-12T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66355
published_at 2026-04-11T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66335
published_at 2026-04-09T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66321
published_at 2026-04-08T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66274
published_at 2026-04-07T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66304
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25118
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/1186b2fec8a665a8f228ed66e6d60abf8407c17b
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1186b2fec8a665a8f228ed66e6d60abf8407c17b
3
reference_url https://github.com/TYPO3/typo3/commit/c7a135c25a14b852eebe4335f21ba3c606188f3a
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/c7a135c25a14b852eebe4335f21ba3c606188f3a
4
reference_url https://github.com/TYPO3/typo3/commit/cafc5af7fdce7734e6c8f9ecf2efd17b246fc049
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/cafc5af7fdce7734e6c8f9ecf2efd17b246fc049
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-38r2-5695-334w
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T17:58:02Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-38r2-5695-334w
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25118
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25118
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-003
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T17:58:02Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-003
8
reference_url https://github.com/advisories/GHSA-38r2-5695-334w
reference_id GHSA-38r2-5695-334w
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-38r2-5695-334w
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
1
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
2
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25118, GHSA-38r2-5695-334w
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv1b-xtv4-4yg3
7
url VCID-gyyu-n3b1-zbcj
vulnerability_id VCID-gyyu-n3b1-zbcj
summary
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool
### Problem
Local platform users who can write to TYPO3’s mail‑file spool directory can craft a file that the system will automatically deserialize without any class restrictions. This flaw allows an attacker to inject and execute arbitrary PHP code in the public scope of the web server.

The vulnerability is triggered when TYPO3 is configured with `$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_type'] = 'file';` and a scheduler task or cron job runs the command `mailer:spool:send`. The spool‑send operation performs the insecure deserialization that is at the core of this issue.

### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.

### Credits
Thanks to Vitaly Simonovich for reporting this issue, and to TYPO3 security team members Elias Häußler and Oliver Hader for fixing it.

### References
* [TYPO3-CORE-SA-2026-004](https://typo3.org/security/advisory/typo3-core-sa-2026-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0813
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-08T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0812
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08174
published_at 2026-04-04T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11696
published_at 2026-04-12T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11732
published_at 2026-04-11T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11721
published_at 2026-04-09T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.1153
published_at 2026-04-18T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11527
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1167
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0859
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f
3
reference_url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13
4
reference_url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-7vp9-x248-9vr9
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-0859
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2026-004
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T14:11:54Z/
url https://typo3.org/security/advisory/typo3-core-sa-2026-004
8
reference_url https://github.com/advisories/GHSA-7vp9-x248-9vr9
reference_id GHSA-7vp9-x248-9vr9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vp9-x248-9vr9
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.49
purl pkg:composer/typo3/cms-core@11.5.49
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.49
1
url pkg:composer/typo3/cms-core@12.4.41
purl pkg:composer/typo3/cms-core@12.4.41
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.41
2
url pkg:composer/typo3/cms-core@13.4.23
purl pkg:composer/typo3/cms-core@13.4.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.23
3
url pkg:composer/typo3/cms-core@14.0.2
purl pkg:composer/typo3/cms-core@14.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@14.0.2
aliases CVE-2026-0859, GHSA-7vp9-x248-9vr9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyyu-n3b1-zbcj
8
url VCID-h6y3-7gsq-skh2
vulnerability_id VCID-h6y3-7gsq-skh2
summary
TYPO3 vulnerable to Weak Authentication in Session Handling
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie generated for the first site can be reused on the second site without requiring additional authentication. This vulnerability has been addressed in versions 8.7.55, 9.5.44, 10.4.41, 11.5.33, and 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47127
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39866
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39861
published_at 2026-04-18T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39839
published_at 2026-04-13T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39856
published_at 2026-04-12T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.3989
published_at 2026-04-11T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.3988
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39867
published_at 2026-04-08T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39812
published_at 2026-04-07T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39889
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47127
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2023-47127.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2023-47127.yaml
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://github.com/TYPO3/typo3/commit/535dfbdc54fd5362e0bc08d911db44eac7f64019
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-006
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-006
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-47127
reference_id CVE-2023-47127
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-47127
6
reference_url https://github.com/advisories/GHSA-3vmm-7h4j-69rm
reference_id GHSA-3vmm-7h4j-69rm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3vmm-7h4j-69rm
7
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
reference_id GHSA-3vmm-7h4j-69rm
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T20:41:35Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-3vmm-7h4j-69rm
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.33
purl pkg:composer/typo3/cms-core@11.5.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-mud2-s4rc-fuf6
9
vulnerability VCID-n7ng-zkkb-2qaz
10
vulnerability VCID-nubu-f1sc-gbes
11
vulnerability VCID-taj6-zj2n-5kg8
12
vulnerability VCID-xy6y-312d-rygj
13
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.33
1
url pkg:composer/typo3/cms-core@12.4.8
purl pkg:composer/typo3/cms-core@12.4.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-jxw7-skw6-q7bg
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.8
aliases CVE-2023-47127, GHSA-3vmm-7h4j-69rm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6y3-7gsq-skh2
9
url VCID-mud2-s4rc-fuf6
vulnerability_id VCID-mud2-s4rc-fuf6
summary
TYPO3 vulnerable to an Uncontrolled Resource Consumption in the ShowImageController
### Problem
The `ShowImageController` (_eID tx_cms_showpic_) lacks a cryptographic HMAC-signature on the `frame` HTTP query parameter (e.g. `/index.php?eID=tx_cms_showpic?file=3&...&frame=12345`).
This allows adversaries to instruct the system to produce an arbitrary number of thumbnail images on the server side.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

#### ℹ️ **Strong security defaults - Manual actions required**

The `frame` HTTP query parameter is now ignored, since it could not be used by core APIs.

The new feature flag `security.frontend.allowInsecureFrameOptionInShowImageController` – which is disabled per default – can be used to reactivate the previous behavior.

### Credits
Thanks to TYPO3 security team member Torben Hansen who reported this issue and to TYPO3 core & security team members Benjamin Mack and Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-010](https://typo3.org/security/advisory/typo3-core-sa-2024-010)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34358
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15666
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15479
published_at 2026-04-18T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-16T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15545
published_at 2026-04-13T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15608
published_at 2026-04-12T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15643
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15676
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15619
published_at 2026-04-08T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15533
published_at 2026-04-07T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1573
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34358
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/05c95fed869a1a6dcca06c7077b83b6ea866ff14
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/05c95fed869a1a6dcca06c7077b83b6ea866ff14
3
reference_url https://github.com/TYPO3/typo3/commit/1e70ebf736935413b0531004839362b4fb0755a5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/1e70ebf736935413b0531004839362b4fb0755a5
4
reference_url https://github.com/TYPO3/typo3/commit/df7909b6a1cf0f12a42994d0cc3376b607746142
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/commit/df7909b6a1cf0f12a42994d0cc3376b607746142
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-36g8-62qv-5957
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-36g8-62qv-5957
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34358
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34358
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-010
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:43:40Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-010
8
reference_url https://github.com/advisories/GHSA-36g8-62qv-5957
reference_id GHSA-36g8-62qv-5957
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-36g8-62qv-5957
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
1
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
2
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34358, GHSA-36g8-62qv-5957
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mud2-s4rc-fuf6
10
url VCID-n7ng-zkkb-2qaz
vulnerability_id VCID-n7ng-zkkb-2qaz
summary
TYPO3 vulnerable to Improper Access Control of Resources Referenced by t3:// URI Scheme
### Problem
The TYPO3-specific [`t3://` URI scheme](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references) could be used to access resources outside of the users' permission scope. This encompassed files, folders, pages, and records (although only if a valid link-handling configuration was provided). Exploiting this vulnerability requires a valid backend user account.

### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-005](https://typo3.org/security/advisory/typo3-core-sa-2024-005)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25120
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40722
published_at 2026-04-04T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40681
published_at 2026-04-18T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40711
published_at 2026-04-16T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40666
published_at 2026-04-13T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40684
published_at 2026-04-12T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40719
published_at 2026-04-11T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-09T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40695
published_at 2026-04-08T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40645
published_at 2026-04-07T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40694
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25120
1
reference_url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/2de87ff113ba24333ab7cbb8078588743f8958d6
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/2de87ff113ba24333ab7cbb8078588743f8958d6
4
reference_url https://github.com/TYPO3/typo3/commit/33f4d279b82bca0a509227a17065244c6156e68f
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/33f4d279b82bca0a509227a17065244c6156e68f
5
reference_url https://github.com/TYPO3/typo3/commit/ae0dfc4c058a90c10eedb3f49cfaf33164d21cdd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/ae0dfc4c058a90c10eedb3f49cfaf33164d21cdd
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-wf85-8hx9-gj7c
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-wf85-8hx9-gj7c
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25120
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25120
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-005
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-14T15:55:10Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-005
9
reference_url https://github.com/advisories/GHSA-wf85-8hx9-gj7c
reference_id GHSA-wf85-8hx9-gj7c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wf85-8hx9-gj7c
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
1
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
2
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25120, GHSA-wf85-8hx9-gj7c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ng-zkkb-2qaz
11
url VCID-nubu-f1sc-gbes
vulnerability_id VCID-nubu-f1sc-gbes
summary
TYPO3 Allows Information Disclosure via DBAL Restriction Handling
### Problem
When performing a database query involving multiple tables through the database abstraction layer (DBAL), frontend user permissions are only applied via `FrontendGroupRestriction` to the last table. As a result, data from additional tables included in the same query may be unintentionally exposed to unauthorized users.

### Solution
Update to TYPO3 versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

### Credits
Thanks to Christian Futterlieb for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42256
published_at 2026-04-09T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-18T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42265
published_at 2026-04-16T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42215
published_at 2026-04-13T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-02T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42249
published_at 2026-04-08T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42198
published_at 2026-04-07T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42243
published_at 2026-04-12T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42279
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47937
1
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
2
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-x8pv-fgxp-8v3x
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47937
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-011
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T13:57:34Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-011
5
reference_url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
reference_id GHSA-x8pv-fgxp-8v3x
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x8pv-fgxp-8v3x
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.44
purl pkg:composer/typo3/cms-core@11.5.44
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.44
1
url pkg:composer/typo3/cms-core@12.4.31
purl pkg:composer/typo3/cms-core@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.31
2
url pkg:composer/typo3/cms-core@13.4.12
purl pkg:composer/typo3/cms-core@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyyu-n3b1-zbcj
1
vulnerability VCID-jxw7-skw6-q7bg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.12
aliases CVE-2025-47937, GHSA-x8pv-fgxp-8v3x
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nubu-f1sc-gbes
12
url VCID-taj6-zj2n-5kg8
vulnerability_id VCID-taj6-zj2n-5kg8
summary
TYPO3 vulnerable to Improper Access Control Persisting File Abstraction Layer Entities via Data Handler
### Problem
Entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account.


### Solution
Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described.

#### ℹ️ Strong security defaults - Manual actions required

When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore.

When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`.

### Credits
Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2024-006](https://typo3.org/security/advisory/typo3-core-sa-2024-006)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25121
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53262
published_at 2026-04-04T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53338
published_at 2026-04-18T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53332
published_at 2026-04-16T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53294
published_at 2026-04-13T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53311
published_at 2026-04-12T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53327
published_at 2026-04-11T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.53276
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53282
published_at 2026-04-08T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.5323
published_at 2026-04-07T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53236
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25121
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/38f0bf9a61e10365be26eb75bc23a81184dbed07
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/38f0bf9a61e10365be26eb75bc23a81184dbed07
3
reference_url https://github.com/TYPO3/typo3/commit/71e652bf84b16fd3592205f61f36750ab03db74c
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/71e652bf84b16fd3592205f61f36750ab03db74c
4
reference_url https://github.com/TYPO3/typo3/commit/b47b6ddf5a5f3f852c6e43f837360780c12e3c47
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/b47b6ddf5a5f3f852c6e43f837360780c12e3c47
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-rj3x-wvc6-5j66
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:07:53Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-rj3x-wvc6-5j66
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-25121
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-25121
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-006
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:07:53Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-006
8
reference_url https://github.com/advisories/GHSA-rj3x-wvc6-5j66
reference_id GHSA-rj3x-wvc6-5j66
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rj3x-wvc6-5j66
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.35
purl pkg:composer/typo3/cms-core@11.5.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-mud2-s4rc-fuf6
6
vulnerability VCID-nubu-f1sc-gbes
7
vulnerability VCID-xy6y-312d-rygj
8
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.35
1
url pkg:composer/typo3/cms-core@12.4.11
purl pkg:composer/typo3/cms-core@12.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.11
2
url pkg:composer/typo3/cms-core@13.0.1
purl pkg:composer/typo3/cms-core@13.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-gyyu-n3b1-zbcj
5
vulnerability VCID-jxw7-skw6-q7bg
6
vulnerability VCID-mud2-s4rc-fuf6
7
vulnerability VCID-nubu-f1sc-gbes
8
vulnerability VCID-xy6y-312d-rygj
9
vulnerability VCID-yxy9-ngwb-6qdm
10
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.0.1
aliases CVE-2024-25121, GHSA-rj3x-wvc6-5j66
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-taj6-zj2n-5kg8
13
url VCID-vyvy-y3cw-hbgr
vulnerability_id VCID-vyvy-y3cw-hbgr
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) is vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php is vulnerable. The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Users are advised to update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.35 LTS, 11.5.23 LTS and 12.2.0 which fix this problem. For users who are unable to patch in a timely manner the TypoScript setting `config.absRefPrefix` should at least be set to a static path value, instead of using auto - e.g. `config.absRefPrefix=/`. This workaround **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24814
reference_id
reference_type
scores
0
value 0.00867
scoring_system epss
scoring_elements 0.75119
published_at 2026-04-07T12:55:00Z
1
value 0.00867
scoring_system epss
scoring_elements 0.75197
published_at 2026-04-18T12:55:00Z
2
value 0.00867
scoring_system epss
scoring_elements 0.7519
published_at 2026-04-16T12:55:00Z
3
value 0.00867
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-11T12:55:00Z
4
value 0.00867
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-12T12:55:00Z
5
value 0.00867
scoring_system epss
scoring_elements 0.75153
published_at 2026-04-13T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-02T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24814
1
reference_url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484
4
reference_url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549
5
reference_url https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-001
7
reference_url https://typo3.org/security/advisory/typo3-psa-2023-001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://typo3.org/security/advisory/typo3-psa-2023-001
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-24814
reference_id CVE-2023-24814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-24814
9
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml
reference_id CVE-2023-24814.YAML
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml
10
reference_url https://github.com/advisories/GHSA-r4f8-f93x-5qh3
reference_id GHSA-r4f8-f93x-5qh3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r4f8-f93x-5qh3
11
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3
reference_id GHSA-r4f8-f93x-5qh3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:14Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.23
purl pkg:composer/typo3/cms-core@11.5.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zn99-ywte-33g6
15
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.23
1
url pkg:composer/typo3/cms-core@12.2.0
purl pkg:composer/typo3/cms-core@12.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.2.0
aliases CVE-2023-24814, GHSA-r4f8-f93x-5qh3
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyvy-y3cw-hbgr
14
url VCID-xy6y-312d-rygj
vulnerability_id VCID-xy6y-312d-rygj
summary
TYPO3 Potential Open Redirect via Parsing Differences
### Problem
Applications that use `TYPO3\CMS\Core\Http\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks.

### Solution
Update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.

### Credits
Thanks to Sam Mush and Christian Eßl who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2025-002](https://typo3.org/security/advisory/typo3-core-sa-2025-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55892
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40409
published_at 2026-04-04T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40366
published_at 2026-04-18T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.4035
published_at 2026-04-13T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40369
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40407
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40396
published_at 2026-04-16T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40384
published_at 2026-04-08T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40334
published_at 2026-04-07T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40383
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55892
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/a4abf48d254685f43383e6e7f80d48aebaea56af
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/a4abf48d254685f43383e6e7f80d48aebaea56af
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T20:12:41Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-55892
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-55892
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-002
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T20:12:41Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-002
6
reference_url https://github.com/advisories/GHSA-2fx5-pggv-6jjr
reference_id GHSA-2fx5-pggv-6jjr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2fx5-pggv-6jjr
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.42
purl pkg:composer/typo3/cms-core@11.5.42
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.42
1
url pkg:composer/typo3/cms-core@12.4.25
purl pkg:composer/typo3/cms-core@12.4.25
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.25
2
url pkg:composer/typo3/cms-core@13.4.3
purl pkg:composer/typo3/cms-core@13.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.4.3
aliases CVE-2024-55892, GHSA-2fx5-pggv-6jjr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xy6y-312d-rygj
15
url VCID-zn99-ywte-33g6
vulnerability_id VCID-zn99-ywte-33g6
summary
Improper Access Control
TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38499
reference_id
reference_type
scores
0
value 0.02109
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-18T12:55:00Z
1
value 0.02109
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-02T12:55:00Z
2
value 0.02109
scoring_system epss
scoring_elements 0.84066
published_at 2026-04-04T12:55:00Z
3
value 0.02109
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-07T12:55:00Z
4
value 0.02109
scoring_system epss
scoring_elements 0.84091
published_at 2026-04-08T12:55:00Z
5
value 0.02109
scoring_system epss
scoring_elements 0.84097
published_at 2026-04-09T12:55:00Z
6
value 0.02109
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-11T12:55:00Z
7
value 0.02109
scoring_system epss
scoring_elements 0.84108
published_at 2026-04-12T12:55:00Z
8
value 0.02109
scoring_system epss
scoring_elements 0.84104
published_at 2026-04-13T12:55:00Z
9
value 0.02109
scoring_system epss
scoring_elements 0.84126
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38499
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a
3
reference_url https://typo3.org/security/advisory/typo3-core-sa-2023-003
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://typo3.org/security/advisory/typo3-core-sa-2023-003
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38499
reference_id CVE-2023-38499
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-38499
5
reference_url https://github.com/advisories/GHSA-jq6g-4v5m-wm9r
reference_id GHSA-jq6g-4v5m-wm9r
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jq6g-4v5m-wm9r
6
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r
reference_id GHSA-jq6g-4v5m-wm9r
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:16:37Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.30
purl pkg:composer/typo3/cms-core@11.5.30
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-xy6y-312d-rygj
14
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.30
1
url pkg:composer/typo3/cms-core@12.4.4
purl pkg:composer/typo3/cms-core@12.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.4
aliases CVE-2023-38499, GHSA-jq6g-4v5m-wm9r
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn99-ywte-33g6
16
url VCID-zwgt-rm1f-6bf2
vulnerability_id VCID-zwgt-rm1f-6bf2
summary
TYPO3 vulnerable to Cross-Site Scripting in the ShowImageController
### Problem
Failing to properly encode user-controlled values in file entities, the `ShowImageController` (_eID tx_cms_showpic_) is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to file entities.

### Solution
Update to TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 that fix the problem described.

### Credits
Thanks to TYPO3 security team member Torben Hansen who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-009](https://typo3.org/security/advisory/typo3-core-sa-2024-009)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34357
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-02T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70421
published_at 2026-04-18T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-16T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70369
published_at 2026-04-13T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70383
published_at 2026-04-12T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70399
published_at 2026-04-11T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70375
published_at 2026-04-09T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-08T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70315
published_at 2026-04-07T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70337
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34357
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7
3
reference_url https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee
4
reference_url https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34357
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34357
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-009
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T15:47:12Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-009
8
reference_url https://github.com/advisories/GHSA-hw6c-6gwq-3m3m
reference_id GHSA-hw6c-6gwq-3m3m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hw6c-6gwq-3m3m
fixed_packages
0
url pkg:composer/typo3/cms-core@11.5.37
purl pkg:composer/typo3/cms-core@11.5.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-nubu-f1sc-gbes
5
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.37
1
url pkg:composer/typo3/cms-core@12.4.15
purl pkg:composer/typo3/cms-core@12.4.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.4.15
2
url pkg:composer/typo3/cms-core@13.1.1
purl pkg:composer/typo3/cms-core@13.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-gyyu-n3b1-zbcj
4
vulnerability VCID-jxw7-skw6-q7bg
5
vulnerability VCID-nubu-f1sc-gbes
6
vulnerability VCID-xy6y-312d-rygj
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@13.1.1
aliases CVE-2024-34357, GHSA-hw6c-6gwq-3m3m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwgt-rm1f-6bf2
Fixing_vulnerabilities
0
url VCID-8sdd-b1bn-cuhx
vulnerability_id VCID-8sdd-b1bn-cuhx
summary
TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset
### Problem
When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions.

### Solution
Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-014](https://typo3.org/security/advisory/typo3-core-sa-2022-014)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23502
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35816
published_at 2026-04-08T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35906
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.3581
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35822
published_at 2026-04-16T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35783
published_at 2026-04-13T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35806
published_at 2026-04-12T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35846
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35839
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35936
published_at 2026-04-04T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35766
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23502
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23502.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23502.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23502.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23502.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/d9ffbf24fcc62068033ebb3912538347bd380a6c
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/d9ffbf24fcc62068033ebb3912538347bd380a6c
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T18:47:27Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23502
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23502
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-014
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-014
8
reference_url https://github.com/advisories/GHSA-mgj2-q8wp-29rr
reference_id GHSA-mgj2-q8wp-29rr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mgj2-q8wp-29rr
fixed_packages
0
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
1
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
2
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23502, GHSA-mgj2-q8wp-29rr, GMS-2022-8135
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sdd-b1bn-cuhx
1
url VCID-t1n7-eswt-73gw
vulnerability_id VCID-t1n7-eswt-73gw
summary
TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework
### Problem
Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code.

The existence of individual TypoScript instructions for a particular form item (known as [`formDefinitionOverrides`](https://docs.typo3.org/c/typo3/cms-form/main/en-us/I/Concepts/FrontendRendering/Index.html#form-element-properties)) and a valid backend user account with access to the form module are needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-015](https://typo3.org/security/advisory/typo3-core-sa-2022-015)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23503
reference_id
reference_type
scores
0
value 0.00517
scoring_system epss
scoring_elements 0.66719
published_at 2026-04-08T12:55:00Z
1
value 0.00517
scoring_system epss
scoring_elements 0.66759
published_at 2026-04-18T12:55:00Z
2
value 0.00517
scoring_system epss
scoring_elements 0.66745
published_at 2026-04-16T12:55:00Z
3
value 0.00517
scoring_system epss
scoring_elements 0.66711
published_at 2026-04-13T12:55:00Z
4
value 0.00517
scoring_system epss
scoring_elements 0.6674
published_at 2026-04-12T12:55:00Z
5
value 0.00517
scoring_system epss
scoring_elements 0.66754
published_at 2026-04-11T12:55:00Z
6
value 0.00517
scoring_system epss
scoring_elements 0.66734
published_at 2026-04-09T12:55:00Z
7
value 0.00517
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-02T12:55:00Z
8
value 0.00517
scoring_system epss
scoring_elements 0.66697
published_at 2026-04-04T12:55:00Z
9
value 0.00517
scoring_system epss
scoring_elements 0.6667
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23503
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23503.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23503.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1302e88565821f2159e08b5d818d28de17ecc830
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T18:23:57Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-c5wx-6c2c-f7rm
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23503
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-015
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-015
8
reference_url https://github.com/advisories/GHSA-c5wx-6c2c-f7rm
reference_id GHSA-c5wx-6c2c-f7rm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c5wx-6c2c-f7rm
fixed_packages
0
url pkg:composer/typo3/cms-core@8.7.49
purl pkg:composer/typo3/cms-core@8.7.49
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.49
1
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
2
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
3
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
4
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23503, GHSA-c5wx-6c2c-f7rm, GMS-2022-8132
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1n7-eswt-73gw
2
url VCID-ve7g-8st5-wffb
vulnerability_id VCID-ve7g-8st5-wffb
summary
TYPO3 CMS vulnerable to Denial of Service in Page Error Handling
### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.

This vulnerability is very similar, but not identical, to the one described in [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005) (CVE-2021-21359).

### Solution
Update to TYPO3 versions 9.5.38 ELTS, 10.4.33 or 11.5.20 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-012](https://typo3.org/security/advisory/typo3-core-sa-2022-012)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23500
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54778
published_at 2026-04-02T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54818
published_at 2026-04-09T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54821
published_at 2026-04-08T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.5477
published_at 2026-04-07T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54801
published_at 2026-04-04T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54831
published_at 2026-04-18T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54828
published_at 2026-04-16T12:55:00Z
7
value 0.00317
scoring_system epss
scoring_elements 0.54789
published_at 2026-04-13T12:55:00Z
8
value 0.00317
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-12T12:55:00Z
9
value 0.00317
scoring_system epss
scoring_elements 0.54829
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23500
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23500.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23500.yaml
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a
4
reference_url https://github.com/TYPO3/typo3/commit/73b46b6a627093112cfca4b895a198ca5e1970b7
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/73b46b6a627093112cfca4b895a198ca5e1970b7
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:53:56Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23500
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23500
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-012
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-012
8
reference_url https://github.com/advisories/GHSA-8c28-5mp7-v24h
reference_id GHSA-8c28-5mp7-v24h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8c28-5mp7-v24h
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
aliases CVE-2022-23500, GHSA-8c28-5mp7-v24h, GMS-2022-8130
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ve7g-8st5-wffb
3
url VCID-w13x-3rp9-wyej
vulnerability_id VCID-w13x-3rp9-wyej
summary
TYPO3 CMS vulnerable to Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration
> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.3)

### Problem
Due to the lack of handling user-submitted [YAML placeholder expressions](https://docs.typo3.org/m/typo3/reference-coreapi/main/en-us/Configuration/Yaml/YamlApi.html#custom-placeholder-processing) in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors.

A valid backend user account having administrator privileges is needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### Credits
Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue.

### References
* [TYPO3-CORE-SA-2022-016](https://typo3.org/security/advisory/typo3-core-sa-2022-016)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23504
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54501
published_at 2026-04-08T12:55:00Z
1
value 0.00313
scoring_system epss
scoring_elements 0.5451
published_at 2026-04-18T12:55:00Z
2
value 0.00313
scoring_system epss
scoring_elements 0.54507
published_at 2026-04-16T12:55:00Z
3
value 0.00313
scoring_system epss
scoring_elements 0.54468
published_at 2026-04-13T12:55:00Z
4
value 0.00313
scoring_system epss
scoring_elements 0.54489
published_at 2026-04-12T12:55:00Z
5
value 0.00313
scoring_system epss
scoring_elements 0.54506
published_at 2026-04-11T12:55:00Z
6
value 0.00313
scoring_system epss
scoring_elements 0.54495
published_at 2026-04-09T12:55:00Z
7
value 0.00313
scoring_system epss
scoring_elements 0.54457
published_at 2026-04-02T12:55:00Z
8
value 0.00313
scoring_system epss
scoring_elements 0.5448
published_at 2026-04-04T12:55:00Z
9
value 0.00313
scoring_system epss
scoring_elements 0.54448
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23504
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23504.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23504.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/d1e627ff7eef07bd94c53db861e85977b203900a
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T19:21:01Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23504
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23504
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-016
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-016
8
reference_url https://github.com/advisories/GHSA-8w3p-qh3x-6gjr
reference_id GHSA-8w3p-qh3x-6gjr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8w3p-qh3x-6gjr
fixed_packages
0
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
1
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
2
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
3
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23504, GHSA-8w3p-qh3x-6gjr, GMS-2022-8131
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w13x-3rp9-wyej
4
url VCID-zdq2-dhb2-6kaq
vulnerability_id VCID-zdq2-dhb2-6kaq
summary
TYPO3 CMS vulnerable to Weak Authentication in Frontend Login
### Problem
Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary.

### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.

### References
* [TYPO3-CORE-SA-2022-013](https://typo3.org/security/advisory/typo3-core-sa-2022-013)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23501
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45749
published_at 2026-04-08T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.4579
published_at 2026-04-18T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45795
published_at 2026-04-16T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45746
published_at 2026-04-13T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45738
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45768
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45745
published_at 2026-04-09T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45724
published_at 2026-04-02T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45744
published_at 2026-04-04T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45693
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23501
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T18:48:00Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23501
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23501
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2022-013
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2022-013
8
reference_url https://github.com/advisories/GHSA-jfp7-79g7-89rf
reference_id GHSA-jfp7-79g7-89rf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jfp7-79g7-89rf
fixed_packages
0
url pkg:composer/typo3/cms-core@8.7.49
purl pkg:composer/typo3/cms-core@8.7.49
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@8.7.49
1
url pkg:composer/typo3/cms-core@9.5.38
purl pkg:composer/typo3/cms-core@9.5.38
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@9.5.38
2
url pkg:composer/typo3/cms-core@10.4.33
purl pkg:composer/typo3/cms-core@10.4.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@10.4.33
3
url pkg:composer/typo3/cms-core@11.5.20
purl pkg:composer/typo3/cms-core@11.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-mud2-s4rc-fuf6
10
vulnerability VCID-n7ng-zkkb-2qaz
11
vulnerability VCID-nubu-f1sc-gbes
12
vulnerability VCID-taj6-zj2n-5kg8
13
vulnerability VCID-vyvy-y3cw-hbgr
14
vulnerability VCID-xy6y-312d-rygj
15
vulnerability VCID-zn99-ywte-33g6
16
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20
4
url pkg:composer/typo3/cms-core@12.1.1
purl pkg:composer/typo3/cms-core@12.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1r9g-c5rn-ukgb
1
vulnerability VCID-4t9s-p25a-cfas
2
vulnerability VCID-65ue-7jd9-23gf
3
vulnerability VCID-8d2m-1ffv-jqe1
4
vulnerability VCID-axvk-13qf-tka7
5
vulnerability VCID-g4uc-qeb6-myed
6
vulnerability VCID-gv1b-xtv4-4yg3
7
vulnerability VCID-gyyu-n3b1-zbcj
8
vulnerability VCID-h6y3-7gsq-skh2
9
vulnerability VCID-jxw7-skw6-q7bg
10
vulnerability VCID-mud2-s4rc-fuf6
11
vulnerability VCID-n7ng-zkkb-2qaz
12
vulnerability VCID-nubu-f1sc-gbes
13
vulnerability VCID-taj6-zj2n-5kg8
14
vulnerability VCID-vyvy-y3cw-hbgr
15
vulnerability VCID-xy6y-312d-rygj
16
vulnerability VCID-zn99-ywte-33g6
17
vulnerability VCID-zwgt-rm1f-6bf2
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@12.1.1
aliases CVE-2022-23501, GHSA-jfp7-79g7-89rf, GMS-2022-8134
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdq2-dhb2-6kaq
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@11.5.20