Search for packages
Package details: pkg:composer/typo3/cms-core@8.7.56
purl pkg:composer/typo3/cms-core@8.7.56
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-2f1j-4zed-73gp
Aliases:
CVE-2023-30451
GHSA-w6x2-jg8h-p6mp
Path Traversal in TYPO3 File Abstraction Layer Storages ### Problem Configurable storages using the local driver of the File Abstraction Layer (FAL) could be configured to access directories outside of the root directory of the corresponding project. The system setting in `BE/lockRootPath` was not evaluated by the file abstraction layer component. An administrator-level backend user account is required to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. #### ℹ️ **Strong security defaults - Manual actions required** _see [Important: #102800 changelog](https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/11.5.x/Important-102800-FileAbstractionLayerEnforcesAbsolutePathsToMatchProjectRootOrLockRootPath.html)_ Assuming that a web project is located in the directory `/var/www/example.org` (the "project root path" for Composer-based projects) and the publicly accessible directory is located at `/var/www/example.org/public` (the "public root path"), accessing resources via the File Abstraction Layer component is limited to the mentioned directories. To grant additional access to directories, they must be explicitly configured in the system settings of `$GLOBALS['TYPO3_CONF_VARS']['BE']['lockRootPath']` - either using the Install Tool or according to deployment techniques. The existing setting has been extended to support multiple directories configured as an array of strings. Example: ```php $GLOBALS['TYPO3_CONF_VARS']['BE']['lockRootPath'] = [ ‘/var/shared/documents/’, ‘/var/shared/images/’, ]; ``` ❗ **Storages that reference directories not explicitly granted will be marked as "offline" internally - no resources can be used in the website's frontend and backend context.** ### Credits Thanks to TYPO3 core & security team members Oliver Hader and Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2024-001](https://typo3.org/security/advisory/typo3-core-sa-2024-001)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
VCID-89e7-n8qr-mkc1
Aliases:
CVE-2024-22188
GHSA-5w2h-59j3-8x5w
TYPO3 Install Tool vulnerable to Code Execution ### Problem Several settings in the Install Tool for configuring the path to system binaries were vulnerable to code execution. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions. The corresponding change for this advisory involves enforcing the known disadvantages described in [TYPO3-PSA-2020-002: Protecting Install Tool with Sudo Mode](https://typo3.org/security/advisory/typo3-psa-2020-002). ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. ### Credits Thanks to Rickmer Frier & Daniel Jonka who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2024-002](https://typo3.org/security/advisory/typo3-core-sa-2024-002)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
VCID-evyj-ctem-nffy
Aliases:
CVE-2024-25119
GHSA-h47m-3f78-qp9g
TYPO3 Install Tool vulnerable to Information Disclosure of Encryption Key ### Problem The plaintext value of `$GLOBALS['SYS']['encryptionKey']` was displayed in the editing forms of the TYPO3 Install Tool user interface. This allowed attackers to utilize the value to generate cryptographic hashes used for verifying the authenticity of HTTP request parameters. Exploiting this vulnerability requires an administrator-level backend user account with system maintainer permissions. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. ### Credits Thanks to TYPO3 core & security team member Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2024-004](https://typo3.org/security/advisory/typo3-core-sa-2024-004)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
VCID-jcjk-1u7e-vbez
Aliases:
CVE-2024-25118
GHSA-38r2-5695-334w
TYPO3 Backend Forms vulnerable to Information Disclosure of Hashed Passwords ### Problem Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using brute force techniques. Exploiting this vulnerability requires a valid backend user account. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. ### Credits Thanks to the TYPO3 framework merger Christian Kuhn and external security researchers Maximilian Beckmann, Klaus-Günther Schmidt who reported this issue, and TYPO3 security team member Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2024-003](https://typo3.org/security/advisory/typo3-core-sa-2024-003)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
VCID-wrje-qvf1-2ua8
Aliases:
CVE-2024-25121
GHSA-rj3x-wvc6-5j66
TYPO3 vulnerable to Improper Access Control Persisting File Abstraction Layer Entities via Data Handler ### Problem Entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference files in the fallback storage directly and retrieve their file names and contents. The fallback storage ("zero-storage") is used as a backward compatibility layer for files located outside properly configured file storages and within the public web root directory. Exploiting this vulnerability requires a valid backend user account. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. #### ℹ️ Strong security defaults - Manual actions required When persisting entities of the File Abstraction Layer directly via DataHandler, `sys_file` entities are now denied by default, and `sys_file_reference` & `sys_file_metadata` entities are not permitted to reference files in the fallback storage anymore. When importing data from secure origins, this must be explicitly enabled in the corresponding DataHandler instance by using `$dataHandler->isImporting = true;`. ### Credits Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2024-006](https://typo3.org/security/advisory/typo3-core-sa-2024-006)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
VCID-yqf5-djd2-suea
Aliases:
CVE-2024-25120
GHSA-wf85-8hx9-gj7c
TYPO3 vulnerable to Improper Access Control of Resources Referenced by t3:// URI Scheme ### Problem The TYPO3-specific [`t3://` URI scheme](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references) could be used to access resources outside of the users' permission scope. This encompassed files, folders, pages, and records (although only if a valid link-handling configuration was provided). Exploiting this vulnerability requires a valid backend user account. ### Solution Update to TYPO3 versions 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, 13.0.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 core & security team member Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2024-005](https://typo3.org/security/advisory/typo3-core-sa-2024-005)
8.7.57
Affected by 0 other vulnerabilities.
9.5.46
Affected by 0 other vulnerabilities.
10.4.43
Affected by 0 other vulnerabilities.
11.5.35
Affected by 8 other vulnerabilities.
12.4.11
Affected by 8 other vulnerabilities.
13.0.1
Affected by 9 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-01T18:15:30.862708+00:00 GitLab Importer Affected by VCID-yqf5-djd2-suea https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2024-25120.yml 36.1.3
2025-07-01T18:15:30.605821+00:00 GitLab Importer Affected by VCID-wrje-qvf1-2ua8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2024-25121.yml 36.1.3
2025-07-01T18:15:30.455221+00:00 GitLab Importer Affected by VCID-89e7-n8qr-mkc1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2024-22188.yml 36.1.3
2025-07-01T18:15:30.207967+00:00 GitLab Importer Affected by VCID-evyj-ctem-nffy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2024-25119.yml 36.1.3
2025-07-01T18:15:30.066340+00:00 GitLab Importer Affected by VCID-jcjk-1u7e-vbez https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2024-25118.yml 36.1.3
2025-07-01T14:34:20.708197+00:00 GHSA Importer Affected by VCID-89e7-n8qr-mkc1 https://github.com/advisories/GHSA-5w2h-59j3-8x5w 36.1.3
2025-07-01T14:34:19.736506+00:00 GHSA Importer Affected by VCID-2f1j-4zed-73gp https://github.com/advisories/GHSA-w6x2-jg8h-p6mp 36.1.3
2025-07-01T14:34:19.523507+00:00 GHSA Importer Affected by VCID-wrje-qvf1-2ua8 https://github.com/advisories/GHSA-rj3x-wvc6-5j66 36.1.3
2025-07-01T14:34:19.370036+00:00 GHSA Importer Affected by VCID-yqf5-djd2-suea https://github.com/advisories/GHSA-wf85-8hx9-gj7c 36.1.3
2025-07-01T14:34:19.267264+00:00 GHSA Importer Affected by VCID-evyj-ctem-nffy https://github.com/advisories/GHSA-h47m-3f78-qp9g 36.1.3
2025-07-01T14:34:19.052529+00:00 GHSA Importer Affected by VCID-jcjk-1u7e-vbez https://github.com/advisories/GHSA-38r2-5695-334w 36.1.3