Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-form@10.2.2
Typecomposer
Namespacetypo3
Namecms-form
Version10.2.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.25
Latest_non_vulnerable_version13.4.3
Affected_by_vulnerabilities
0
url VCID-dhrm-uxuv-zfaj
vulnerability_id VCID-dhrm-uxuv-zfaj
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form
### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described.

### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.

### References
* [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21358
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59411
published_at 2026-04-02T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.5945
published_at 2026-04-29T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59465
published_at 2026-04-26T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59444
published_at 2026-04-24T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59471
published_at 2026-04-21T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59488
published_at 2026-04-18T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59481
published_at 2026-04-16T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59448
published_at 2026-04-13T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59467
published_at 2026-04-12T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59483
published_at 2026-04-11T12:55:00Z
10
value 0.00379
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-09T12:55:00Z
11
value 0.00379
scoring_system epss
scoring_elements 0.59451
published_at 2026-04-08T12:55:00Z
12
value 0.00379
scoring_system epss
scoring_elements 0.59338
published_at 2026-04-01T12:55:00Z
13
value 0.00379
scoring_system epss
scoring_elements 0.594
published_at 2026-04-07T12:55:00Z
14
value 0.00379
scoring_system epss
scoring_elements 0.59435
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21358
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21358.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21358.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21358.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21358.yaml
3
reference_url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-21358
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-21358
5
reference_url https://packagist.org/packages/typo3/cms-form
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://packagist.org/packages/typo3/cms-form
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2021-004
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2021-004
7
reference_url https://github.com/advisories/GHSA-x79j-wgqv-g8h2
reference_id GHSA-x79j-wgqv-g8h2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x79j-wgqv-g8h2
fixed_packages
0
url pkg:composer/typo3/cms-form@10.4.14
purl pkg:composer/typo3/cms-form@10.4.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@10.4.14
1
url pkg:composer/typo3/cms-form@11.1.1
purl pkg:composer/typo3/cms-form@11.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@11.1.1
aliases CVE-2021-21358, GHSA-x79j-wgqv-g8h2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrm-uxuv-zfaj
1
url VCID-he5m-6wj4-rbhc
vulnerability_id VCID-he5m-6wj4-rbhc
summary
Broken Access Control in Form Framework
### Problem
Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework.

In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation.

A valid backend user account with access to the form module is needed to exploit this vulnerability.

### Solution
Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.

### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue.

### References
* [TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21357
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78199
published_at 2026-04-02T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78327
published_at 2026-04-29T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78312
published_at 2026-04-26T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78306
published_at 2026-04-24T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78273
published_at 2026-04-21T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78276
published_at 2026-04-18T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.78279
published_at 2026-04-16T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78248
published_at 2026-04-13T12:55:00Z
8
value 0.01121
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-12T12:55:00Z
9
value 0.01121
scoring_system epss
scoring_elements 0.78269
published_at 2026-04-11T12:55:00Z
10
value 0.01121
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-09T12:55:00Z
11
value 0.01121
scoring_system epss
scoring_elements 0.78238
published_at 2026-04-08T12:55:00Z
12
value 0.01121
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-01T12:55:00Z
13
value 0.01121
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-07T12:55:00Z
14
value 0.01121
scoring_system epss
scoring_elements 0.78229
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21357
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21357.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21357.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21357.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21357.yaml
3
reference_url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-21357
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-21357
5
reference_url https://packagist.org/packages/typo3/cms-form
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://packagist.org/packages/typo3/cms-form
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2021-003
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2021-003
7
reference_url https://github.com/advisories/GHSA-3vg7-jw9m-pc3f
reference_id GHSA-3vg7-jw9m-pc3f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3vg7-jw9m-pc3f
fixed_packages
0
url pkg:composer/typo3/cms-form@10.4.14
purl pkg:composer/typo3/cms-form@10.4.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@10.4.14
1
url pkg:composer/typo3/cms-form@11.1.1
purl pkg:composer/typo3/cms-form@11.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@11.1.1
aliases CVE-2021-21357, GHSA-3vg7-jw9m-pc3f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he5m-6wj4-rbhc
2
url VCID-umt7-rv7r-f3bk
vulnerability_id VCID-umt7-rv7r-f3bk
summary
TYPO3 Form Framework Module vulnerable to Cross-Site Request Forgery
### Problem
A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method.

Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions:

* the user opens a malicious link, such as one sent via email.
* the user visits a compromised or manipulated website while the following settings are misconfigured:
  + `security.backend.enforceReferrer` feature is disabled,
  + `BE/cookieSameSite` configuration is set to `lax` or `none`

The vulnerability in the affected downstream component “Form Framework Module” allows attackers to manipulate or delete persisted form definitions.

### Solution
Update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.

### Credits
Thanks to TYPO3 core and security members Benjamin Franzke, Oliver Hader, Andreas Kienast, Torben Hansen, Elias Häußler who fixed the issue.

### References
* [TYPO3-CORE-SA-2025-007](https://typo3.org/security/advisory/typo3-core-sa-2025-007)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55922
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40457
published_at 2026-04-29T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40739
published_at 2026-04-02T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40766
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.4069
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.4074
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40747
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40731
published_at 2026-04-12T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40712
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40757
published_at 2026-04-16T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40728
published_at 2026-04-18T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40651
published_at 2026-04-21T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40553
published_at 2026-04-24T12:55:00Z
12
value 0.00189
scoring_system epss
scoring_elements 0.4054
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55922
1
reference_url https://github.com/TYPO3-CMS/form
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/form
2
reference_url https://github.com/TYPO3-CMS/form/commit/93327743f5dfd31c44898ce16e3e004e05f8ba5f
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/form/commit/93327743f5dfd31c44898ce16e3e004e05f8ba5f
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-ww7h-g2qf-7xv6
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:42:02Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-ww7h-g2qf-7xv6
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-55922
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-55922
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-007
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-14T19:42:02Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-007
6
reference_url https://github.com/advisories/GHSA-ww7h-g2qf-7xv6
reference_id GHSA-ww7h-g2qf-7xv6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ww7h-g2qf-7xv6
fixed_packages
0
url pkg:composer/typo3/cms-form@10.4.48
purl pkg:composer/typo3/cms-form@10.4.48
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@10.4.48
1
url pkg:composer/typo3/cms-form@11.5.42
purl pkg:composer/typo3/cms-form@11.5.42
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@11.5.42
2
url pkg:composer/typo3/cms-form@12.4.25
purl pkg:composer/typo3/cms-form@12.4.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@12.4.25
3
url pkg:composer/typo3/cms-form@13.4.3
purl pkg:composer/typo3/cms-form@13.4.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@13.4.3
aliases CVE-2024-55922, GHSA-ww7h-g2qf-7xv6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umt7-rv7r-f3bk
3
url VCID-xh7y-56vy-5ud8
vulnerability_id VCID-xh7y-56vy-5ud8
summary
Unrestricted File Upload in Form Framework
### Problem
Due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_.

TYPO3 Extbase extensions, which implement a file upload and do not implement a custom _TypeConverter_ to transform uploaded files into _FileReference_ domain model objects are affected by the vulnerability as well, since the _UploadedFileReferenceConverter_ of _ext:form_ handles the file upload and will accept files of any mime-type which are persisted to the default location.

In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information.

No authentication is required to exploit this vulnerability.

### Solution
Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.

Type converter _UploadedFileReferenceConverter_ is not registered globally anymore and just handles uploaded files within the scope of the Form Framework. Guessable storage location has changed from _/fileadmin/user_upload/form\_\<random-hash\>/_ to _/fileadmin/form_uploads/<random-40-bit>_. Allowed mime-types must match expected file extensions (e.g. _application/pdf_ must be _.pdf_, and cannot be _.html_).

Extbase extensions, who rely on the global availability of the _UploadedFileReferenceConverter_ must now implement a custom _TypeConverter_ to handle file uploads or explicitly implement the ext:form _UploadedFileReferenceConverter_ with appropriate setting for accepted mime-types.

### Credits
Thanks to Sebastian Michaelsen, Marc Lindemann, Oliver Eglseder, Markus Volkmer, Jakob Kunzmann, Johannes Regner, Richie Lee who reported this issue, and to TYPO3 core & security team members Oliver Hader & Benni Mack, as well as TYPO3 contributor Ralf Zimmermann who fixed the issue.

### References
* [TYPO3-CORE-SA-2021-002](https://typo3.org/security/advisory/typo3-core-sa-2021-002)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21355
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.6168
published_at 2026-04-02T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-29T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61776
published_at 2026-04-26T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61759
published_at 2026-04-24T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61764
published_at 2026-04-21T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61782
published_at 2026-04-18T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61777
published_at 2026-04-16T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61736
published_at 2026-04-13T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61755
published_at 2026-04-12T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61767
published_at 2026-04-11T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61746
published_at 2026-04-09T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-08T12:55:00Z
12
value 0.00416
scoring_system epss
scoring_elements 0.61606
published_at 2026-04-01T12:55:00Z
13
value 0.00416
scoring_system epss
scoring_elements 0.61682
published_at 2026-04-07T12:55:00Z
14
value 0.00416
scoring_system epss
scoring_elements 0.6171
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21355
1
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21355.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2021-21355.yaml
2
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21355.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2021-21355.yaml
3
reference_url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-21355
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-21355
5
reference_url https://packagist.org/packages/typo3/cms-form
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://packagist.org/packages/typo3/cms-form
6
reference_url https://typo3.org/security/advisory/typo3-core-sa-2021-002
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2021-002
7
reference_url https://github.com/advisories/GHSA-2r6j-862c-m2v2
reference_id GHSA-2r6j-862c-m2v2
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2r6j-862c-m2v2
fixed_packages
0
url pkg:composer/typo3/cms-form@10.4.14
purl pkg:composer/typo3/cms-form@10.4.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@10.4.14
1
url pkg:composer/typo3/cms-form@11.1.1
purl pkg:composer/typo3/cms-form@11.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-umt7-rv7r-f3bk
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@11.1.1
aliases CVE-2021-21355, GHSA-2r6j-862c-m2v2
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xh7y-56vy-5ud8
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-form@10.2.2