Search for vulnerabilities
| Vulnerability ID | VCID-c6zq-cfg5-u7d9 |
| Aliases |
GHSA-gj48-w74w-8gvm
GMS-2024-342 |
| Summary | Path Traversal in TYPO3 Core Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-gj48-w74w-8gvm |
| generic_textual | MODERATE | https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2016-11-22-2.yaml |
| generic_textual | MODERATE | https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-024 |
No EPSS data available for this vulnerability.
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:50:32.134413+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-gj48-w74w-8gvm/GHSA-gj48-w74w-8gvm.json | 38.0.0 |