{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57635?format=json","vulnerability_id":"VCID-8fcj-b2dq-3qav","summary":"Typo3 Backend History Module Vulnerable to XSS\nThe Backend History Module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 does not properly restrict access, which allows remote authenticated editors to read the history of arbitrary records via a crafted URL.","aliases":[{"alias":"CVE-2012-6146"},{"alias":"GHSA-2hp4-8h6h-93rr"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/49855?format=json","purl":"pkg:composer/typo3/cms@4.5.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1c26-d6gv-4ud4"},{"vulnerability":"VCID-2zuf-yf2d-t3hg"},{"vulnerability":"VCID-57cn-dmzh-4kdq"},{"vulnerability":"VCID-59zz-tmvz-sqgm"},{"vulnerability":"VCID-88ng-ph1q-cybw"},{"vulnerability":"VCID-8fcj-b2dq-3qav"},{"vulnerability":"VCID-93v3-exum-5qf5"},{"vulnerability":"VCID-99uu-rfrf-bqa7"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-b7s9-hkwv-63ht"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-dban-xxn2-f3b2"},{"vulnerability":"VCID-fprf-zjud-8fcv"},{"vulnerability":"VCID-fv74-gq28-rkd5"},{"vulnerability":"VCID-g75m-m11u-7fbj"},{"vulnerability":"VCID-hpju-vhzg-jyes"},{"vulnerability":"VCID-jb2j-eygc-n7b7"},{"vulnerability":"VCID-jk5g-64sn-ffgx"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-n177-3cym-d7e7"},{"vulnerability":"VCID-nvd8-5j51-2yeg"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-tu8v-rv87-wfa3"},{"vulnerability":"VCID-v3xx-f132-g3hn"},{"vulnerability":"VCID-vbbx-pk8m-jfhd"},{"vulnerability":"VCID-xb19-n4s4-rqc9"},{"vulnerability":"VCID-xns2-f7um-qqgn"},{"vulnerability":"VCID-y6zm-rwrr-m3ah"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-ybdc-993m-aqfu"},{"vulnerability":"VCID-yk4b-baue-rkbt"},{"vulnerability":"VCID-yytp-t23g-wkc8"},{"vulnerability":"VCID-zbvd-rppy-gyab"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/55171?format=json","purl":"pkg:composer/typo3/cms@4.6.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-57cn-dmzh-4kdq"},{"vulnerability":"VCID-88ng-ph1q-cybw"},{"vulnerability":"VCID-8fcj-b2dq-3qav"},{"vulnerability":"VCID-99uu-rfrf-bqa7"},{"vulnerability":"VCID-b7s9-hkwv-63ht"},{"vulnerability":"VCID-dban-xxn2-f3b2"},{"vulnerability":"VCID-fprf-zjud-8fcv"},{"vulnerability":"VCID-fv74-gq28-rkd5"},{"vulnerability":"VCID-g75m-m11u-7fbj"},{"vulnerability":"VCID-jb2j-eygc-n7b7"},{"vulnerability":"VCID-v3xx-f132-g3hn"},{"vulnerability":"VCID-vbbx-pk8m-jfhd"},{"vulnerability":"VCID-xns2-f7um-qqgn"},{"vulnerability":"VCID-y6zm-rwrr-m3ah"},{"vulnerability":"VCID-yk4b-baue-rkbt"},{"vulnerability":"VCID-yytp-t23g-wkc8"},{"vulnerability":"VCID-zbvd-rppy-gyab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/54353?format=json","purl":"pkg:composer/typo3/cms@4.7.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-57cn-dmzh-4kdq"},{"vulnerability":"VCID-59zz-tmvz-sqgm"},{"vulnerability":"VCID-8fcj-b2dq-3qav"},{"vulnerability":"VCID-9j2h-q1n5-kbgt"},{"vulnerability":"VCID-b7s9-hkwv-63ht"},{"vulnerability":"VCID-d79s-4kzk-hugy"},{"vulnerability":"VCID-dban-xxn2-f3b2"},{"vulnerability":"VCID-g75m-m11u-7fbj"},{"vulnerability":"VCID-hpju-vhzg-jyes"},{"vulnerability":"VCID-jb2j-eygc-n7b7"},{"vulnerability":"VCID-m3dg-q4eg-wyfb"},{"vulnerability":"VCID-p8m8-y53c-cubn"},{"vulnerability":"VCID-v3xx-f132-g3hn"},{"vulnerability":"VCID-vbbx-pk8m-jfhd"},{"vulnerability":"VCID-xns2-f7um-qqgn"},{"vulnerability":"VCID-y6zm-rwrr-m3ah"},{"vulnerability":"VCID-y9d1-wwne-hba5"},{"vulnerability":"VCID-yytp-t23g-wkc8"},{"vulnerability":"VCID-zbvd-rppy-gyab"},{"vulnerability":"VCID-zqqe-vew2-nbfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.7.0"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6146","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38717","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3919","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39189","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38838","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6146"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6146","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6146"},{"reference_url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005"},{"reference_url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/","reference_id":"","reference_type":"","scores":[],"url":"http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/"},{"reference_url":"https://github.com/advisories/GHSA-2hp4-8h6h-93rr","reference_id":"GHSA-2hp4-8h6h-93rr","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2hp4-8h6h-93rr"}],"weaknesses":[{"cwe_id":79,"name":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","description":"The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users."},{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":264,"name":"Permissions, Privileges, and Access Controls","description":"Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fcj-b2dq-3qav"}