| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-716n-jhj7-ebhh |
| vulnerability_id |
VCID-716n-jhj7-ebhh |
| summary |
Information Disclosure in TYPO3 Page Tree
### Problem
Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to "everybody." However, affected users could not manipulate these pages.
### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.
### Credits
Thanks to Peter Schuler who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.496 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49535 |
| published_at |
2026-05-07T12:55:00Z |
|
| 2 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49476 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49559 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.4959 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49599 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49628 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.4963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49584 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49611 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49594 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49566 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49593 |
| published_at |
2026-04-04T12:55:00Z |
|
| 14 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49545 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47780 |
|
| 1 |
| reference_url |
https://github.com/TYPO3-CMS/backend |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/TYPO3-CMS/backend |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47780, GHSA-rf5m-h8q9-9w6q
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-716n-jhj7-ebhh |
|
| 1 |
| url |
VCID-a89c-jvwa-6kh5 |
| vulnerability_id |
VCID-a89c-jvwa-6kh5 |
| summary |
Cross-Site Scripting in Content Preview
### Problem
It has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-007](https://typo3.org/security/advisory/typo3-core-sa-2021-007) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59458 |
| published_at |
2026-05-07T12:55:00Z |
|
| 1 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59435 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.594 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59464 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59448 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59488 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59471 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59444 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59465 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5945 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5941 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59338 |
| published_at |
2026-04-01T12:55:00Z |
|
| 16 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59411 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21340 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21340, GHSA-fjh3-g8gq-9q92
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a89c-jvwa-6kh5 |
|
| 2 |
| url |
VCID-buz5-hzv3-97hp |
| vulnerability_id |
VCID-buz5-hzv3-97hp |
| summary |
TYPO3 backend modules have Broken Access Control
Missing authorization checks in the Backend Routing of TYPO3 CMS versions 9.0.0‑9.5.54, 10.0.0‑10.4.53, 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to directly invoke AJAX backend routes without having access to the corresponding backend modules. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20919 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20978 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21779 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.2201 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21964 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21824 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21813 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21707 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22694 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22807 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 14 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22822 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2277 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59017 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59017, GHSA-2fhw-2j7m-mr4m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-buz5-hzv3-97hp |
|
| 3 |
| url |
VCID-g8t4-khh5-cqey |
| vulnerability_id |
VCID-g8t4-khh5-cqey |
| summary |
TYPO3 Bookmark Toolbar vulnerable to denial of service
An uncaught exception in the Bookmark Toolbar of TYPO3 CMS versions 11.0.0–11.5.47, 12.0.0–12.4.36, and 13.0.0–13.4.17 lets administrator‑level backend users trigger a denial‑of‑service condition in the backend user interface by saving manipulated data in the bookmark toolbar. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05655 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05695 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06066 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06046 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06038 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06002 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05969 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05808 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06161 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06095 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06055 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 14 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06122 |
| published_at |
2026-04-12T12:55:00Z |
|
| 15 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06115 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59014 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59014, GHSA-xrcq-533q-8rxw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g8t4-khh5-cqey |
|
| 4 |
| url |
VCID-t3jn-vwbx-u7cr |
| vulnerability_id |
VCID-t3jn-vwbx-u7cr |
| summary |
Cross-Site Scripting in Content Preview (CType menu)
### Problem
It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21370 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56873 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.5679 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56836 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56852 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56835 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56917 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56921 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56891 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56935 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56922 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56779 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56871 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56895 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21370 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21370, GHSA-x7hc-x7fm-f7qh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t3jn-vwbx-u7cr |
|
| 5 |
| url |
VCID-uvfp-uq3t-6ffg |
| vulnerability_id |
VCID-uvfp-uq3t-6ffg |
| summary |
TYPO3 CMS Allows Broken Access Control in Edit Document Controller
### Problem
By exploiting the `defVals` parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.
### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
### Credits
Thanks to Daniel Windloff for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.
### References
* [TYPO3-CORE-SA-2026-001](https://typo3.org/security/advisory/typo3-core-sa-2026-001) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59020 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01891 |
| published_at |
2026-05-07T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01904 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01956 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01923 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01928 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01934 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01848 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01872 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01886 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 14 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01903 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59020 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59020, GHSA-5j7q-wmh7-cqhg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvfp-uq3t-6ffg |
|
| 6 |
| url |
VCID-ymvw-ev1y-8fa3 |
| vulnerability_id |
VCID-ymvw-ev1y-8fa3 |
| summary |
Denial of Service in TYPO3 Bookmark Toolbar
### Problem
Due to insufficient input validation, manipulated data saved in the bookmark toolbar of the backend user interface causes a general error state, blocking further access to the interface. Exploiting this vulnerability requires an administrator-level backend user account.
### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.
### Credits
Thanks to Hendrik Eichner who reported this issue and to TYPO3 core & security team members Oliver Hader and Benjamin Franzke who fixed the issue.
### References
* [TYPO3-CORE-SA-2024-011](https://typo3.org/security/advisory/typo3-core-sa-2024-001) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48074 |
| published_at |
2026-05-07T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48009 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48088 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48143 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48133 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48153 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48146 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48123 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48202 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48139 |
| published_at |
2026-04-12T12:55:00Z |
|
| 14 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48165 |
| published_at |
2026-04-11T12:55:00Z |
|
| 15 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48142 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34537 |
|
| 1 |
| reference_url |
https://github.com/TYPO3-CMS/backend |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/TYPO3-CMS/backend |
|
| 2 |
| reference_url |
https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
LOW |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 3 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 4 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 5 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/ |
|
|
| url |
https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp |
|
| 3 |
|
| 4 |
| reference_url |
https://typo3.org/security/advisory/typo3-core-sa-2024-011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/ |
|
|
| url |
https://typo3.org/security/advisory/typo3-core-sa-2024-011 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-34537, GHSA-ffcv-v6pw-qhrp
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymvw-ev1y-8fa3 |
|
|