Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms-beuser@12.4.22
Typecomposer
Namespacetypo3
Namecms-beuser
Version12.4.22
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.4.25
Latest_non_vulnerable_version13.4.18
Affected_by_vulnerabilities
0
url VCID-xfvw-hhb4-cycy
vulnerability_id VCID-xfvw-hhb4-cycy
summary
TYPO3 Cross-Site Request Forgery in Backend User Module
### Problem
A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method.

Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions:

* the user opens a malicious link, such as one sent via email.
* the user visits a compromised or manipulated website while the following settings are misconfigured:
  + `security.backend.enforceReferrer` feature is disabled,
  + `BE/cookieSameSite` configuration is set to `lax` or `none`

The vulnerability in the affected downstream component “Backend User Module” allows attackers to initiate password resets for other backend users or to terminate their user sessions.

### Solution
Update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.

### Credits
Thanks to Gabriel Dimitrov who reported this issue and to TYPO3 core and security members Benjamin Franzke, Oliver Hader, Andreas Kienast, Torben Hansen, Elias Häußler who fixed the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55894
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45727
published_at 2026-04-07T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.4565
published_at 2026-04-29T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.4571
published_at 2026-04-26T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45699
published_at 2026-04-24T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45769
published_at 2026-04-21T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45823
published_at 2026-04-18T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45829
published_at 2026-04-16T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45773
published_at 2026-04-12T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45803
published_at 2026-04-11T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45757
published_at 2026-04-02T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45778
published_at 2026-04-13T12:55:00Z
11
value 0.0023
scoring_system epss
scoring_elements 0.45781
published_at 2026-04-09T12:55:00Z
12
value 0.0023
scoring_system epss
scoring_elements 0.45784
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55894
1
reference_url https://github.com/TYPO3-CMS/beuser
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/beuser
2
reference_url https://github.com/TYPO3-CMS/beuser/commit/18603efc3a66d3255fdd04eb6bda6b4d6a95abea
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:45:57Z/
url https://github.com/TYPO3-CMS/beuser/commit/18603efc3a66d3255fdd04eb6bda6b4d6a95abea
3
reference_url https://github.com/TYPO3-CMS/beuser/commit/1bb317cb2bc0b2f6ba4f758a088f060b36c67f9d
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:45:57Z/
url https://github.com/TYPO3-CMS/beuser/commit/1bb317cb2bc0b2f6ba4f758a088f060b36c67f9d
4
reference_url https://github.com/TYPO3-CMS/beuser/commit/4142112a878f8805234729751bc6b9c0091560ab
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:45:57Z/
url https://github.com/TYPO3-CMS/beuser/commit/4142112a878f8805234729751bc6b9c0091560ab
5
reference_url https://github.com/TYPO3/typo3/security/advisories/GHSA-6w4x-gcx3-8p7v
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:45:57Z/
url https://github.com/TYPO3/typo3/security/advisories/GHSA-6w4x-gcx3-8p7v
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-55894
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-55894
7
reference_url https://typo3.org/security/advisory/typo3-core-sa-2025-004
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:45:57Z/
url https://typo3.org/security/advisory/typo3-core-sa-2025-004
8
reference_url https://github.com/advisories/GHSA-6w4x-gcx3-8p7v
reference_id GHSA-6w4x-gcx3-8p7v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6w4x-gcx3-8p7v
fixed_packages
0
url pkg:composer/typo3/cms-beuser@12.4.25
purl pkg:composer/typo3/cms-beuser@12.4.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-beuser@12.4.25
1
url pkg:composer/typo3/cms-beuser@13.4.3
purl pkg:composer/typo3/cms-beuser@13.4.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-beuser@13.4.3
aliases CVE-2024-55894, GHSA-6w4x-gcx3-8p7v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfvw-hhb4-cycy
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-beuser@12.4.22