Search for packages
Package details: pkg:composer/typo3/cms-core@9.5.6
purl pkg:composer/typo3/cms-core@9.5.6
Next non-vulnerable version 9.5.8
Latest non-vulnerable version 13.4.3
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-dybf-xk32-pkdg
Aliases:
CVE-2020-15241
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator > ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source:  This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
9.5.7
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (10)
Vulnerability Summary Aliases
VCID-7zyp-yza7-2udn Security Misconfiguration in User Session Handling. 2019-05-07-2
VCID-8hs1-4esc-7qac Information Disclosure in User Authentication. 2019-05-07-5
VCID-bf43-tfbv-6uef TYPO3 Information Disclosure in Page Tree It has been discovered backend users not having read access to specific pages still could see them in the page tree which actually should be disallowed. A valid backend user account is needed in order to exploit this vulnerability. GHSA-wvvp-jwf5-qcpc
VCID-d5cf-nhec-auab TYPO3 Information Disclosure in User Authentication It has been discovered that login failures have been logged on the default stream with log level "warning" including plain-text user credentials. GHSA-wj85-rg5g-v8jm
VCID-dkmy-bwds-s7f4 Cross-site Scripting Cross-Site Scripting in Fluid Engine. 2019-05-07-1
VCID-dybf-xk32-pkdg Cross-Site Scripting in ternary conditional operator > ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source:  This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013) CVE-2020-15241
GHSA-7733-hjv6-4h47
VCID-f9e5-am8t-j7gc TYPO3 Image Processing susceptible to Code Execution TYPO3 8.x before 8.7.25 and 9.x before 9.5.6 is susceptible to remote code execution because it does not properly configure the applications used for image processing, as demonstrated by ImageMagick or GraphicsMagick. For a successful exploit, the GhostScript binary `gs` must be available on the server system. CVE-2019-11832
GHSA-3w4h-r27h-4r2w
VCID-r9ct-7gds-vkg3 TYPO3 Security Misconfiguration in User Session Handling When users change their password existing sessions for that particular user account are not revoked. A valid backend or frontend user account is required in order to make use of this vulnerability. GHSA-xmgr-jff3-fcfv
VCID-rep9-2rxn-gfee Code Injection Possible Arbitrary Code Execution in Image Processing. 2019-05-07-3
VCID-yfgj-vux5-sybb Information Disclosure in Page Tree. 2019-05-07-4

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-03T13:56:49.603299+00:00 GitLab Importer Fixing VCID-r9ct-7gds-vkg3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/GHSA-xmgr-jff3-fcfv.yml 36.1.3
2025-07-03T13:56:49.253518+00:00 GitLab Importer Fixing VCID-d5cf-nhec-auab https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/GHSA-wj85-rg5g-v8jm.yml 36.1.3
2025-07-03T13:56:48.123942+00:00 GitLab Importer Fixing VCID-bf43-tfbv-6uef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/GHSA-wvvp-jwf5-qcpc.yml 36.1.3
2025-07-03T13:55:45.556930+00:00 GitLab Importer Affected by VCID-dybf-xk32-pkdg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/CVE-2020-15241.yml 36.1.3
2025-07-01T18:11:37.674610+00:00 GitLab Importer Fixing VCID-dkmy-bwds-s7f4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/2019-05-07-1.yml 36.1.3
2025-07-01T18:11:37.588242+00:00 GitLab Importer Fixing VCID-8hs1-4esc-7qac https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/2019-05-07-5.yml 36.1.3
2025-07-01T18:11:37.556112+00:00 GitLab Importer Fixing VCID-rep9-2rxn-gfee https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/2019-05-07-3.yml 36.1.3
2025-07-01T18:11:37.510248+00:00 GitLab Importer Fixing VCID-7zyp-yza7-2udn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/2019-05-07-2.yml 36.1.3
2025-07-01T18:11:37.491516+00:00 GitLab Importer Fixing VCID-yfgj-vux5-sybb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/typo3/cms-core/2019-05-07-4.yml 36.1.3
2025-07-01T14:35:02.312660+00:00 GHSA Importer Fixing VCID-d5cf-nhec-auab https://github.com/advisories/GHSA-wj85-rg5g-v8jm 36.1.3
2025-07-01T14:35:02.260821+00:00 GHSA Importer Fixing VCID-bf43-tfbv-6uef https://github.com/advisories/GHSA-wvvp-jwf5-qcpc 36.1.3
2025-07-01T14:35:02.242647+00:00 GHSA Importer Fixing VCID-r9ct-7gds-vkg3 https://github.com/advisories/GHSA-xmgr-jff3-fcfv 36.1.3
2025-07-01T14:32:55.516003+00:00 GHSA Importer Fixing VCID-f9e5-am8t-j7gc https://github.com/advisories/GHSA-3w4h-r27h-4r2w 36.1.3
2025-07-01T14:30:42.942758+00:00 GHSA Importer Fixing VCID-dybf-xk32-pkdg https://github.com/advisories/GHSA-7733-hjv6-4h47 36.1.3
2025-07-01T12:26:25.933692+00:00 GithubOSV Importer Fixing VCID-f9e5-am8t-j7gc https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-3w4h-r27h-4r2w/GHSA-3w4h-r27h-4r2w.json 36.1.3
2025-07-01T12:16:14.664025+00:00 GithubOSV Importer Fixing VCID-dybf-xk32-pkdg https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/10/GHSA-7733-hjv6-4h47/GHSA-7733-hjv6-4h47.json 36.1.3
2025-07-01T12:11:38.520581+00:00 GithubOSV Importer Fixing VCID-bf43-tfbv-6uef https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-wvvp-jwf5-qcpc/GHSA-wvvp-jwf5-qcpc.json 36.1.3
2025-07-01T12:11:26.556835+00:00 GithubOSV Importer Fixing VCID-d5cf-nhec-auab https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-wj85-rg5g-v8jm/GHSA-wj85-rg5g-v8jm.json 36.1.3
2025-07-01T12:11:25.203092+00:00 GithubOSV Importer Fixing VCID-r9ct-7gds-vkg3 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-xmgr-jff3-fcfv/GHSA-xmgr-jff3-fcfv.json 36.1.3