{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16032?format=json","vulnerability_id":"VCID-ftr5-c6nt-gbh4","summary":"TYPO3 is vulnerable to Mass Assignment in the Extension table administration library\nThe creating record functionality in Extension table administration library (feuser_adminLib.inc) in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, and 6.0.0 through 6.0.11 allows remote attackers to write to arbitrary fields in the configuration database table via crafted links, aka \"Mass Assignment.\"","aliases":[{"alias":"CVE-2013-7080"},{"alias":"GHSA-5fj8-wh3g-qvq2"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/55269?format=json","purl":"pkg:composer/typo3/cms-core@4.5.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gdb-nxp2-afgk"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-mz1q-ugmv-4ban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@4.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/55270?format=json","purl":"pkg:composer/typo3/cms-core@4.6.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gdb-nxp2-afgk"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-mz1q-ugmv-4ban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@4.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/55272?format=json","purl":"pkg:composer/typo3/cms-core@6.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gdb-nxp2-afgk"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-aeeg-apyz-huda"},{"vulnerability":"VCID-bbrf-qfw6-w3fx"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-mz1q-ugmv-4ban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms-core@6.0.0"},{"url":"http://public2.vulnerablecode.io/api/packages/571360?format=json","purl":"pkg:deb/debian/typo3-src@4.0.2%2Bdebian-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-133h-9erq-2fhy"},{"vulnerability":"VCID-4auu-re6t-p3gu"},{"vulnerability":"VCID-5rae-psy2-dba5"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-mrst-4yau-ubce"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-vgwd-1z7m-gkh8"},{"vulnerability":"VCID-wxg4-7yap-3qdx"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-yadx-n3tq-rkdb"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/typo3-src@4.0.2%252Bdebian-3"},{"url":"http://public2.vulnerablecode.io/api/packages/571361?format=json","purl":"pkg:deb/debian/typo3-src@4.0.2%2Bdebian-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-133h-9erq-2fhy"},{"vulnerability":"VCID-4auu-re6t-p3gu"},{"vulnerability":"VCID-5rae-psy2-dba5"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-mrst-4yau-ubce"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-vgwd-1z7m-gkh8"},{"vulnerability":"VCID-wxg4-7yap-3qdx"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-yadx-n3tq-rkdb"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/typo3-src@4.0.2%252Bdebian-9"},{"url":"http://public2.vulnerablecode.io/api/packages/571362?format=json","purl":"pkg:deb/debian/typo3-src@4.2.5-1%2Blenny9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-133h-9erq-2fhy"},{"vulnerability":"VCID-4auu-re6t-p3gu"},{"vulnerability":"VCID-5rae-psy2-dba5"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-mrst-4yau-ubce"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-vgwd-1z7m-gkh8"},{"vulnerability":"VCID-wxg4-7yap-3qdx"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-yadx-n3tq-rkdb"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/typo3-src@4.2.5-1%252Blenny9"},{"url":"http://public2.vulnerablecode.io/api/packages/571363?format=json","purl":"pkg:deb/debian/typo3-src@4.3.9%2Bdfsg1-1%2Bsqueeze9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-133h-9erq-2fhy"},{"vulnerability":"VCID-4auu-re6t-p3gu"},{"vulnerability":"VCID-5rae-psy2-dba5"},{"vulnerability":"VCID-75re-n41m-y3et"},{"vulnerability":"VCID-8ahj-xadv-xbhr"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-ftr5-c6nt-gbh4"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-mrst-4yau-ubce"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-vgwd-1z7m-gkh8"},{"vulnerability":"VCID-wxg4-7yap-3qdx"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-yadx-n3tq-rkdb"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/typo3-src@4.3.9%252Bdfsg1-1%252Bsqueeze9"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7080","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50892","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50907","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081"},{"reference_url":"http://seclists.org/oss-sec/2013/q4/473","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/oss-sec/2013/q4/473"},{"reference_url":"https://github.com/TYPO3-CMS/core","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/TYPO3-CMS/core"},{"reference_url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004"},{"reference_url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/","reference_id":"","reference_type":"","scores":[],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/"},{"reference_url":"http://www.debian.org/security/2014/dsa-2834","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2014/dsa-2834"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-7080","reference_id":"CVE-2013-7080","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-7080"},{"reference_url":"https://github.com/advisories/GHSA-5fj8-wh3g-qvq2","reference_id":"GHSA-5fj8-wh3g-qvq2","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-5fj8-wh3g-qvq2"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftr5-c6nt-gbh4"}