Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-backend@12.4.6
Typecomposer
Namespacetypo3
Namecms-backend
Version12.4.6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.41
Latest_non_vulnerable_version14.3.0
Affected_by_vulnerabilities
0
url VCID-5pry-8rnc-ubbh
vulnerability_id VCID-5pry-8rnc-ubbh
summary
The TYPO3 CMS Backend has Broken Authentication in Backend MFA
### Problem
The multifactor authentication (MFA) dialog presented during backend login can be bypassed due to insufficient enforcement of access restrictions on all backend routes.

Successful exploitation requires valid backend user credentials, as MFA can only be bypassed after successful authentication.

### Solution
Update to TYPO3 versions 12.4.31 LTS, 13.4.12 LTS that fix the problem described.

### Credits
Thanks to Jens Jacobsen and Y. Kahveci for reporting this issue, and to TYPO3 security team member Torben Hansen for fixing it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47941
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51069
published_at 2026-04-09T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51014
published_at 2026-04-29T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51054
published_at 2026-04-26T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51046
published_at 2026-04-24T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51058
published_at 2026-04-04T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51092
published_at 2026-04-12T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51016
published_at 2026-04-07T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51073
published_at 2026-04-08T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51113
published_at 2026-04-11T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51098
published_at 2026-04-21T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51121
published_at 2026-04-18T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51034
published_at 2026-04-02T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51115
published_at 2026-04-16T12:55:00Z
13
value 0.00276
scoring_system epss
scoring_elements 0.51076
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47941
1
reference_url https://github.com/TYPO3-CMS/backend
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend
2
reference_url https://github.com/TYPO3-CMS/backend/commit/034f589029952084771c5f98d42ed0f69f9a7ead
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend/commit/034f589029952084771c5f98d42ed0f69f9a7ead
3
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-744g-7qm9-hjh9
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T14:31:58Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-744g-7qm9-hjh9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47941
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47941
5
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-015
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T14:31:58Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-015
6
reference_url https://github.com/advisories/GHSA-744g-7qm9-hjh9
reference_id GHSA-744g-7qm9-hjh9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-744g-7qm9-hjh9
fixed_packages
0
url pkg:composer/typo3/cms-backend@12.4.31
purl pkg:composer/typo3/cms-backend@12.4.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-sjs5-c9c4-dfc6
1
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.31
1
url pkg:composer/typo3/cms-backend@13.4.12
purl pkg:composer/typo3/cms-backend@13.4.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-sjs5-c9c4-dfc6
1
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@13.4.12
aliases CVE-2025-47941, GHSA-744g-7qm9-hjh9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pry-8rnc-ubbh
1
url VCID-716n-jhj7-ebhh
vulnerability_id VCID-716n-jhj7-ebhh
summary
Information Disclosure in TYPO3 Page Tree
### Problem
Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to "everybody." However, affected users could not manipulate these pages.

### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.

### Credits
Thanks to Peter Schuler who reported this issue and to TYPO3 core & security team member Oliver Hader who fixed the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47780
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49593
published_at 2026-04-04T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49559
published_at 2026-04-29T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.4959
published_at 2026-04-24T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49599
published_at 2026-04-21T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49628
published_at 2026-04-18T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.4963
published_at 2026-04-16T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49584
published_at 2026-04-13T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49582
published_at 2026-04-12T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49611
published_at 2026-04-11T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49594
published_at 2026-04-09T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.496
published_at 2026-04-26T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49545
published_at 2026-04-07T12:55:00Z
12
value 0.00262
scoring_system epss
scoring_elements 0.49566
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47780
1
reference_url https://github.com/TYPO3-CMS/backend
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend
2
reference_url https://github.com/TYPO3-CMS/backend/commit/8b024b08a2c7071a2f2ff7c758766e4e9273f83c
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend/commit/8b024b08a2c7071a2f2ff7c758766e4e9273f83c
3
reference_url https://github.com/TYPO3-CMS/backend/commit/9ae1ef969b63292a13f80955a95713cabd45cc22
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend/commit/9ae1ef969b63292a13f80955a95713cabd45cc22
4
reference_url https://github.com/TYPO3-CMS/backend/commit/a7b3c924014ada61632cd5e3fb9825fcc86c5719
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend/commit/a7b3c924014ada61632cd5e3fb9825fcc86c5719
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-rf5m-h8q9-9w6q
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T18:17:16Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-rf5m-h8q9-9w6q
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47780
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47780
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-012
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T18:17:16Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-012
8
reference_url https://github.com/advisories/GHSA-rf5m-h8q9-9w6q
reference_id GHSA-rf5m-h8q9-9w6q
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rf5m-h8q9-9w6q
fixed_packages
0
url pkg:composer/typo3/cms-backend@12.4.21
purl pkg:composer/typo3/cms-backend@12.4.21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5pry-8rnc-ubbh
1
vulnerability VCID-sjs5-c9c4-dfc6
2
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.21
1
url pkg:composer/typo3/cms-backend@13.3.1
purl pkg:composer/typo3/cms-backend@13.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5pry-8rnc-ubbh
1
vulnerability VCID-sjs5-c9c4-dfc6
2
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@13.3.1
aliases CVE-2024-47780, GHSA-rf5m-h8q9-9w6q
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-716n-jhj7-ebhh
2
url VCID-sjs5-c9c4-dfc6
vulnerability_id VCID-sjs5-c9c4-dfc6
summary
TYPO3 CSV download feature information disclosure
Missing authorization checks in the CSV download feature of TYPO3 CMS versions 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to disclose information from arbitrary database tables stored within the users' web mounts without having access to them.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59019
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12991
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13152
published_at 2026-04-26T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13182
published_at 2026-04-24T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13175
published_at 2026-04-21T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1308
published_at 2026-04-18T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13081
published_at 2026-04-16T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13054
published_at 2026-04-29T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13902
published_at 2026-04-08T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13819
published_at 2026-04-07T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13954
published_at 2026-04-09T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13911
published_at 2026-04-11T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13875
published_at 2026-04-12T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13827
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59019
1
reference_url https://github.com/TYPO3-CMS/backend/commit/c983415f062c32f8edbb78544a0ff3219bc35d17
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend/commit/c983415f062c32f8edbb78544a0ff3219bc35d17
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59019
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59019
3
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-023
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-09T19:29:26Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-023
4
reference_url https://github.com/advisories/GHSA-j8vm-7q52-2m2m
reference_id GHSA-j8vm-7q52-2m2m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j8vm-7q52-2m2m
fixed_packages
0
url pkg:composer/typo3/cms-backend@12.4.37
purl pkg:composer/typo3/cms-backend@12.4.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.37
1
url pkg:composer/typo3/cms-backend@13.4.18
purl pkg:composer/typo3/cms-backend@13.4.18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@13.4.18
aliases CVE-2025-59019, GHSA-j8vm-7q52-2m2m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjs5-c9c4-dfc6
3
url VCID-uvfp-uq3t-6ffg
vulnerability_id VCID-uvfp-uq3t-6ffg
summary
TYPO3 CMS Allows Broken Access Control in Edit Document Controller
### Problem
By exploiting the `defVals` parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.

### Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.

### Credits
Thanks to Daniel Windloff for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.

### References
* [TYPO3-CORE-SA-2026-001](https://typo3.org/security/advisory/typo3-core-sa-2026-001)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59020
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01874
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01956
published_at 2026-04-29T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01923
published_at 2026-04-26T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01928
published_at 2026-04-24T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01934
published_at 2026-04-21T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01848
published_at 2026-04-18T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01849
published_at 2026-04-16T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01867
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01872
published_at 2026-04-12T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01888
published_at 2026-04-11T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01903
published_at 2026-04-09T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01889
published_at 2026-04-08T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01886
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59020
1
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
2
reference_url https://github.com/TYPO3/typo3/commit/ac3f792bd5ab7c58153fc1075cb9e001c9cebe3b
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T16:42:25Z/
url https://github.com/TYPO3/typo3/commit/ac3f792bd5ab7c58153fc1075cb9e001c9cebe3b
3
reference_url https://github.com/TYPO3/typo3/commit/cd11a19958d823d12d028f9345b41739c7e70118
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T16:42:25Z/
url https://github.com/TYPO3/typo3/commit/cd11a19958d823d12d028f9345b41739c7e70118
4
reference_url https://github.com/TYPO3/typo3/commit/fb98378a8fd30dd50d89a3d1a420780819f38232
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T16:42:25Z/
url https://github.com/TYPO3/typo3/commit/fb98378a8fd30dd50d89a3d1a420780819f38232
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-5j7q-wmh7-cqhg
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/security/advisories/GHSA-5j7q-wmh7-cqhg
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59020
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59020
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2026-001
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-13T16:42:25Z/
url https://typo3.org/security/advisory/typo3-core-sa-2026-001
8
reference_url https://github.com/advisories/GHSA-5j7q-wmh7-cqhg
reference_id GHSA-5j7q-wmh7-cqhg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5j7q-wmh7-cqhg
fixed_packages
0
url pkg:composer/typo3/cms-backend@12.4.41
purl pkg:composer/typo3/cms-backend@12.4.41
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.41
1
url pkg:composer/typo3/cms-backend@13.4.23
purl pkg:composer/typo3/cms-backend@13.4.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@13.4.23
2
url pkg:composer/typo3/cms-backend@14.0.2
purl pkg:composer/typo3/cms-backend@14.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@14.0.2
aliases CVE-2025-59020, GHSA-5j7q-wmh7-cqhg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvfp-uq3t-6ffg
4
url VCID-ymvw-ev1y-8fa3
vulnerability_id VCID-ymvw-ev1y-8fa3
summary
Denial of Service in TYPO3 Bookmark Toolbar
### Problem
Due to insufficient input validation, manipulated data saved in the bookmark toolbar of the backend user interface causes a general error state, blocking further access to the interface. Exploiting this vulnerability requires an administrator-level backend user account.

### Solution
Update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described.

### Credits
Thanks to Hendrik Eichner who reported this issue and to TYPO3 core & security team members Oliver Hader and Benjamin Franzke who fixed the issue.

### References
* [TYPO3-CORE-SA-2024-011](https://typo3.org/security/advisory/typo3-core-sa-2024-001)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34537
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48093
published_at 2026-04-07T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48088
published_at 2026-04-29T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48143
published_at 2026-04-26T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48133
published_at 2026-04-24T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48153
published_at 2026-04-21T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48197
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48202
published_at 2026-04-16T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48123
published_at 2026-04-02T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48144
published_at 2026-04-04T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.4815
published_at 2026-04-13T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48139
published_at 2026-04-12T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.48165
published_at 2026-04-11T12:55:00Z
12
value 0.00249
scoring_system epss
scoring_elements 0.48142
published_at 2026-04-09T12:55:00Z
13
value 0.00249
scoring_system epss
scoring_elements 0.48146
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34537
1
reference_url https://github.com/TYPO3-CMS/backend
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/backend
2
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value LOW
scoring_system cvssv3.1_qr
scoring_elements
3
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value LOW
scoring_system generic_textual
scoring_elements
5
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-ffcv-v6pw-qhrp
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34537
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
1
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34537
4
reference_url https://typo3.org/security/advisory/typo3-core-sa-2024-011
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/
url https://typo3.org/security/advisory/typo3-core-sa-2024-011
5
reference_url https://www.mgm-sp.com/cve/denial-of-service-in-typo3-bookmark-toolbar
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 2.0
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-28T16:12:09Z/
url https://www.mgm-sp.com/cve/denial-of-service-in-typo3-bookmark-toolbar
6
reference_url https://github.com/advisories/GHSA-ffcv-v6pw-qhrp
reference_id GHSA-ffcv-v6pw-qhrp
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ffcv-v6pw-qhrp
fixed_packages
0
url pkg:composer/typo3/cms-backend@12.4.21
purl pkg:composer/typo3/cms-backend@12.4.21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5pry-8rnc-ubbh
1
vulnerability VCID-sjs5-c9c4-dfc6
2
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.21
1
url pkg:composer/typo3/cms-backend@13.3.1
purl pkg:composer/typo3/cms-backend@13.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5pry-8rnc-ubbh
1
vulnerability VCID-sjs5-c9c4-dfc6
2
vulnerability VCID-uvfp-uq3t-6ffg
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@13.3.1
aliases CVE-2024-34537, GHSA-ffcv-v6pw-qhrp
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymvw-ev1y-8fa3
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-backend@12.4.6