Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/typo3/cms-backend@12.3.0 |
| Type | composer |
| Namespace | typo3 |
| Name | cms-backend |
| Version | 12.3.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 12.4.41 |
| Latest_non_vulnerable_version | 14.3.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-5pry-8rnc-ubbh |
| vulnerability_id |
VCID-5pry-8rnc-ubbh |
| summary |
The TYPO3 CMS Backend has Broken Authentication in Backend MFA
### Problem
The multifactor authentication (MFA) dialog presented during backend login can be bypassed due to insufficient enforcement of access restrictions on all backend routes.
Successful exploitation requires valid backend user credentials, as MFA can only be bypassed after successful authentication.
### Solution
Update to TYPO3 versions 12.4.31 LTS, 13.4.12 LTS that fix the problem described.
### Credits
Thanks to Jens Jacobsen and Y. Kahveci for reporting this issue, and to TYPO3 security team member Torben Hansen for fixing it. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-47941 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51069 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51014 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51054 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51046 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51058 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51092 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51113 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51098 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51121 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51034 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51115 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51076 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-47941 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-47941, GHSA-744g-7qm9-hjh9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pry-8rnc-ubbh |
|
| 1 |
| url |
VCID-716n-jhj7-ebhh |
| vulnerability_id |
VCID-716n-jhj7-ebhh |
| summary |
Information Disclosure in TYPO3 Page Tree
### Problem
Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to "everybody." However, affected users could not manipulate these pages.
### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.
### Credits
Thanks to Peter Schuler who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49593 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49559 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.4959 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49599 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49628 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.4963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49584 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49611 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49594 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.496 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49566 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47780 |
|
| 1 |
| reference_url |
https://github.com/TYPO3-CMS/backend |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/TYPO3-CMS/backend |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47780, GHSA-rf5m-h8q9-9w6q
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-716n-jhj7-ebhh |
|
| 2 |
| url |
VCID-sjs5-c9c4-dfc6 |
| vulnerability_id |
VCID-sjs5-c9c4-dfc6 |
| summary |
TYPO3 CSV download feature information disclosure
Missing authorization checks in the CSV download feature of TYPO3 CMS versions 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to disclose information from arbitrary database tables stored within the users' web mounts without having access to them. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59019 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12942 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13152 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13182 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13175 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1308 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13054 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13902 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13819 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13954 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13911 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13827 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59019 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59019, GHSA-j8vm-7q52-2m2m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjs5-c9c4-dfc6 |
|
| 3 |
| url |
VCID-uvfp-uq3t-6ffg |
| vulnerability_id |
VCID-uvfp-uq3t-6ffg |
| summary |
TYPO3 CMS Allows Broken Access Control in Edit Document Controller
### Problem
By exploiting the `defVals` parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.
### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
### Credits
Thanks to Daniel Windloff for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.
### References
* [TYPO3-CORE-SA-2026-001](https://typo3.org/security/advisory/typo3-core-sa-2026-001) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59020 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01956 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01923 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01928 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01934 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01848 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01872 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01886 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-59020 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-59020, GHSA-5j7q-wmh7-cqhg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvfp-uq3t-6ffg |
|
| 4 |
| url |
VCID-ymvw-ev1y-8fa3 |
| vulnerability_id |
VCID-ymvw-ev1y-8fa3 |
| summary |
Denial of Service in TYPO3 Bookmark Toolbar
### Problem
Due to insufficient input validation, manipulated data saved in the bookmark toolbar of the backend user interface causes a general error state, blocking further access to the interface. Exploiting this vulnerability requires an administrator-level backend user account.
### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.
### Credits
Thanks to Hendrik Eichner who reported this issue and to TYPO3 core & security team members Oliver Hader and Benjamin Franzke who fixed the issue.
### References
* [TYPO3-CORE-SA-2024-011](https://typo3.org/security/advisory/typo3-core-sa-2024-001) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48088 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48143 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48133 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48153 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48202 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48123 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48139 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48165 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48142 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48146 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34537 |
|
| 1 |
| reference_url |
https://github.com/TYPO3-CMS/backend |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/TYPO3-CMS/backend |
|
| 2 |
| reference_url |
https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
LOW |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 3 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 4 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 5 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/ |
|
|
| url |
https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp |
|
| 3 |
|
| 4 |
| reference_url |
https://typo3.org/security/advisory/typo3-core-sa-2024-011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C |
|
| 1 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/ |
|
|
| url |
https://typo3.org/security/advisory/typo3-core-sa-2024-011 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-34537, GHSA-ffcv-v6pw-qhrp
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymvw-ev1y-8fa3 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.3.0 |