<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:f="http://typo3.org/ns/TYPO3/CMS/Fluid/ViewHelpers"
     xmlns:n="http://typo3.org/ns/GeorgRinger/News/ViewHelpers">
    <channel>
        <title>Official typo3.org security advisories</title>
        <link>https://typo3.org/security</link>
        <description></description>
        <language>en-gb</language>
        
            <copyright>TYPO3 News</copyright>
        
        <pubDate>
            Sat, 23 May 2026 18:48:21 +0200
        </pubDate>
        <lastBuildDate>
            Sat, 23 May 2026 18:48:21 +0200
        </lastBuildDate>
        
        <atom:link href="https://typo3.org/rss-security" rel="self"
                   type="application/rss+xml"/>
        <generator>TYPO3 EXT:news</generator>
        
            
                <item>
                    <guid isPermaLink="false">news-2929</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:06:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-013: Remote Code Execution in extension &quot;Content Element Selector&quot; (ceselector)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-013
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Content Element Selector&quot; (ceselector) is vulnerable to Remote Code Execution.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e0acf7128e986d81ba33dd2973f39e85b"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="e7ed0f46fac442be7e24e966a6c0c5284"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e1450c86b79d63e748862e9175b5d59e8"><span>Component: </span><a href="https://extensions.typo3.org/extension/ceselector" target="_blank" rel="noreferrer"><span>"Content Element Selector" (ceselector)</span></a></li><li data-list-item-id="ef16125e382d2dededb65f45f166e0ac6"><span>Composer Package Name: mmc/ceselector</span></li><li data-list-item-id="e55f82846f3722d86f585444c88a48f4b"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="ebf0d9acf67b9258a2871058a7e318a9b"><span>Affected Versions: 6.0.0, 5.0.0, 4.0.0 - 4.0.1, 3.0.2 and below</span></li><li data-list-item-id="e9b0e27591e85534da3048616030d916d"><span>Severity: Critical</span></li><li data-list-item-id="e3250de8cc523c3d74ce63de4bb8c08e0"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ed4a36ce7e9ee3f66541df4028de3fba4"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-46725" target="_blank" rel="noreferrer"><span>CVE-2026-46725</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails&nbsp; to safely process untrusted client input of an attacker-controlled cookie directly to PHP's unserialize(). A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server.</p>
<p>Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.</p>
<h3>Solution</h3>
<p>Updated versions 6.0.1, 5.0.1, 4.0.2 and 3.0.3 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/ceselector/6.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ceselector/6.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/ceselector/5.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ceselector/5.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/ceselector/4.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ceselector/4.0.2/zip</a><br><a href="https://extensions.typo3.org/extension/download/ceselector/3.0.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ceselector/3.0.3/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 Security Team member Torben Hansen for reporting the vulnerability and to Matthias Mächler for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2928</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:05:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-012: SQL Injection in extension &quot;Address List&quot; (tt_address)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-012
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Address List&quot; (tt_address) is vulnerable to SQL Injection.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e983e2d5b05d0cf4fe1c591e152deabf6"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="eb3084d85772d516542b004f0b1ac1d67"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e932d87b004d10390f0464c8b3038327c"><span>Component: </span><a href="https://extensions.typo3.org/extension/tt_address" target="_blank" rel="noreferrer"><span>"Address List" (tt_address)</span></a></li><li data-list-item-id="e16b8d7e262950170d5ae79c4d5539815"><span>Composer Package Name: friendsoftypo3/tt-address</span></li><li data-list-item-id="e2cae69c94c4b0d271e6b0cdb2f300156"><span>Vulnerability Type: SQL Injection</span></li><li data-list-item-id="e9dd32cc5f3646a4424342e3d6d3c1674"><span>Affected Versions: 10.0.0, 9.0.0 - 9.1.0, 8.1.1 and below</span></li><li data-list-item-id="e16c804c130b9928e201c4b291ea53494"><span>Severity: Medium (rated lower than the CVSS score, as the vulnerable method is not invoked by the extension itself)</span></li><li data-list-item-id="ee93da55c11ad8d6e8f41836a18c035e9"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e6183342642e8517262c8fbae02473756"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-8827" target="_blank" rel="noreferrer"><span>CVE-2026-8827</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer"><span>CWE-89</span></a></li></ul><h3>Problem Description</h3>
<p>The <i>AddressRepository::getSqlQuery()</i> method constructs a database query without properly sanitizing user input leading to SQL Injection.</p>
<p>The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection</p>
<h3>Solution</h3>
<p>Updated versions 10.0.1, 9.1.1 and 8.1.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/tt_address/10.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/tt_address/10.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/tt_address/9.1.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/tt_address/9.1.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/tt_address/8.1.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/tt_address/8.1.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 Core and Security Team member Georg Ringer for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2927</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:03:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-011: Multiple vulnerabilities in extension &quot;Faceted Search&quot; (ke_search)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-011
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Faceted Search&quot; (ke_search) is vulnerable to XML External Entity injection, Path Traversal and Information Disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e57302391c48acab0572b6c81a6af216f"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="e04b488ce04c8b1e58125c30a07e67925"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e660f2980e9e9feff333606fce8798798"><span>Component:&nbsp;</span><a href="https://extensions.typo3.org/extension/ke_search" target="_blank" rel="noreferrer"><span>"Faceted Search" (ke_search)</span></a></li><li data-list-item-id="e0533def253c6514f205570bb3f49e153"><span>Composer Package Name: tpwd/ke_search</span></li><li data-list-item-id="e5c49d9fdc1b52a64abfc738b4bbf081f"><span>Vulnerability Type: XML External Entity injection, Path Traversal and Information Disclosure</span></li><li data-list-item-id="e7270a5ef0501bef2052957f9f6619384"><span>Affected Versions: 7.0.0, 6.0.0 - 6.6.0, 5.6.1 and below</span></li><li data-list-item-id="ed4ea571185948ba8dd4ade80f9066d77"><span>Severity: Medium</span></li><li data-list-item-id="e8e75e429150e947fa615a2221a83b5d3"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N</span></a></li><li data-list-item-id="ec8d57e5e6a4b9d6a7181ba8b1e7ad338"><span>References:</span><a href="https://www.cve.org/CVERecord?id=CVE-2026-46722" target="_blank" rel="noreferrer"><span> CVE-2026-46722</span></a><span>, </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-46723" target="_blank" rel="noreferrer"><span>CVE-2026-46723</span></a><span>, </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-46724" target="_blank" rel="noreferrer"><span>CVE-2026-46724</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/611.html" target="_blank" rel="noreferrer"><span>CWE-611</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/668.html" target="_blank" rel="noreferrer"><span>CWE-668</span></a><span>,</span><a href="https://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noreferrer"><span> CWE-22</span></a></li></ul><h3>Problem Description</h3>
<p>The OOXML parsing of the file indexer does not disable external entity resolution, making it susceptible to XML External Entity Injection. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index.</p>
<p>Additionally, the <i>additional_tables</i> configuration of the page and tt_content indexers accepts arbitrary table and field names, allowing a backend user with permission to edit indexer configurations to copy sensitive data from internal TYPO3 tables into the search index. Similarly, the file indexer does not normalize the configured directories path, allowing such a user to index documents from arbitrary locations on the server file system through path traversal sequences.</p>
<h3>Solution</h3>
<p>Updated versions 7.0.1, 6.6.1 and 5.6.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/ke_search/7.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ke_search/7.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/ke_search/6.6.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ke_search/6.6.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/ke_search/5.6.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ke_search/5.6.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Seungbin Yang for reporting the vulnerabilities and to Christian Bülter for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2926</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:02:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-010: SQL Injection in extension &quot;News system&quot; (news)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-010
                        
                    </link>
                    <description>It has been discovered that the extension &quot;News system&quot; (news) is vulnerable to SQL Injection.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e6d4942be0eda500f079d9db0a00e9a74"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="ec83f553a18df85c9065cc0c330db2eb1"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="ea736f4f21109b070735681dd6b26d2a3"><span>Component: </span><a href="https://extensions.typo3.org/extension/news" target="_blank" rel="noreferrer"><span>"News system" (news)</span></a></li><li data-list-item-id="ef089723d5eb653749277e1dd94835ea4"><span>Composer Package Name: georgringer/news</span></li><li data-list-item-id="ebe664a5fe14fd0d198a85c24193ec632"><span>Vulnerability Type: SQL Injection</span></li><li data-list-item-id="e3ab2724d40204cd39271410967e5ec2a"><span>Affected Versions: 14.0.0 - 14.0.2, 13.0.0 - 13.0.1, 12.0.0 - 12.3.1, 11.4.3 and below</span></li><li data-list-item-id="eee531e7d7984503f8c8f78905c8d6106"><span>Severity: High</span></li><li data-list-item-id="ea1e40491c7ad10158807e5102eb2b2f2"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e95e80a992e4ad1383b4223b116e92f13"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-8726" target="_blank" rel="noreferrer"><span>CVE-2026-8726</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/89.html" target="_blank" rel="noreferrer"><span>CWE-89</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the "Date Menu of news articles" plugin.</p>
<p>Exploitation requires the "Date Menu of news articles" plugin to be in use and the TypoScript/Plugin setting&nbsp;<i>disableOverrideDemand</i> not to be enabled.</p>
<h3>Solution</h3>
<p>Updated versions 14.0.3, 13.0.2, 12.3.2 and 11.4.4 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/news/14.0.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/news/14.0.3/zip</a><br><a href="https://extensions.typo3.org/extension/download/news/13.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/news/13.0.2/zip</a><br><a href="https://extensions.typo3.org/extension/download/news/12.3.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/news/12.3.2/zip</a><br><a href="https://extensions.typo3.org/extension/download/news/11.4.4/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/news/11.4.4/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 Core Team member Christian Kuhn for reporting the vulnerability and to TYPO3 Core and Security Team member Georg Ringer for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2925</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:01:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-009: Broken Access Control in extension &quot;Frontend User Registration&quot; (sf_register)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-009
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Frontend User Registration&quot; (sf_register) is vulnerable to Broken Access Control.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="eb218a64e725fdf01896b59863c651af8"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="e0e2fd8dd6e2ee745b13cb6421603663d"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e4eb37d0bb6b3d7169b85d99918e1ccc7"><span>Component: </span><a href="https://extensions.typo3.org/extension/sf_register" target="_blank" rel="noreferrer"><span>"Frontend User Registration" (sf_register)</span></a></li><li data-list-item-id="ead1f9b2d862f04c89624cd4ebf6ec139"><span>Composer Package Name: evoweb/sf-register</span></li><li data-list-item-id="ec85e95e703f67ef5a335ffc07dfa4fa5"><span>Vulnerability Type: Broken Access Control</span></li><li data-list-item-id="e1c2dcdfa1e17d1dd7af953756a943ebe"><span>Affected Versions: 14.0.0 - 14.0.1, 13.2.3 and below</span></li><li data-list-item-id="e8d55590e635cf0528347ee2e80f2e866"><span>Severity: Medium</span></li><li data-list-item-id="e36e322bcca9b2f2162d0a6b5d0785151"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N#editor" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e384d64170da87518fab8da7001989dfe"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-46721" target="_blank" rel="noreferrer"><span>CVE-2026-46721</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/915.html" target="_blank" rel="noreferrer"><span>CWE-915</span></a><span>,</span><a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer"><span> CWE-639</span></a></li></ul><h3>Problem Description</h3>
<p>The create and edit flows do not restrict which user properties may be submitted and do not enforce access control on the frontend user group assignment. As a result, an attacker can assign an arbitrary frontend user group to a newly registered or edited account, gaining unauthorized access to content and functionality restricted to privileged frontend user groups.</p>
<h3>Solution</h3>
<p>Updated versions 14.0.2 and 13.2.4 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/sf_register/14.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/sf_register/14.0.2/zip</a><br><a href="https://extensions.typo3.org/extension/download/sf_register/13.2.4/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/sf_register/13.2.4/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Seungbin Yang for reporting the vulnerability and to Sebastian Fischer for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2924</guid>
                    <pubDate>
                        Tue, 19 May 2026 11:00:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-008: Remote Code Execution in extension &quot;Site Crawler&quot; (crawler)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-008
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Site Crawler&quot; (crawler) is vulnerable to Remote Code Execution.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e09c9d0c311c82156a68fbd84f7ace2d3"><span>Release Date: May 19, 2026</span></li><li data-list-item-id="eb4cbce7aa9870af4bcce27504a6a38c2"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="ed63b27358550af32bf56425dea8cb431"><span>Component: </span><a href="https://extensions.typo3.org/extension/crawler" target="_blank" rel="noreferrer"><span>"Site Crawler" (crawler)</span></a></li><li data-list-item-id="ee05659a4e36dfdd5b09a194415fa6a0f"><span>Composer Package Name: tomasnorre/crawler</span></li><li data-list-item-id="eec08493ffa788d34d1ce6e97455ef995"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="ef487471b85f192b0df7bf58c88401ae5"><span>Affected Versions: 12.0.0 - 12.0.10, 11.0.12 and below</span></li><li data-list-item-id="efad8b90f336111d7b13cdcb61c8f5289"><span>Severity: High</span></li><li data-list-item-id="e8584d3219582e3e52b7cdcca45921651"><span>Suggested CVSS v4.0: </span><a href="https://vulnogram.org/cvss4?CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L#editor" target="_blank" rel="noreferrer"><span>AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L</span></a></li><li data-list-item-id="e9d9cf9777d2da67cbb950403d980bc8f"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-8727" target="_blank" rel="noreferrer"><span>CVE-2026-8727</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP objects, leading to Remote Code Execution on the TYPO3 server.</p>
<p>Exploitation requires administrative privileges to configure a crawler-enabled page and trigger the crawl via a Scheduler task, but can be abused by non-super-admin administrators to escalate privileges.</p>
<h3>Solution</h3>
<p>Updated versions 12.0.11 and 11.0.13 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/crawler/12.0.11/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/crawler/12.0.11/zip</a><br><a href="https://extensions.typo3.org/extension/download/crawler/11.0.13/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/crawler/11.0.13/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Roman Hergenreder for reporting the vulnerability and to Tomas Norre Mikkelsen for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2923</guid>
                    <pubDate>
                        Tue, 21 Apr 2026 11:05:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-005: Cleartext storage of Backend User Passwords</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-005
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to sensitive data exposure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e1c249a891492d0c46b2901397817cffc"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="eacaca683e6e848a9fb0a06daf7136468"><strong>Subcomponent:</strong><span> User Profile Settings (ext:backend)</span></li><li data-list-item-id="eeb33999b882d4aaaf6de30c84aeff039"><strong>Release Date:</strong><span> April 21, 2026</span></li><li data-list-item-id="e46368b7dfc55257ce3c3a16c8f5f72b0"><strong>Vulnerability Type:</strong><span> Sensitive Data Exposure</span></li><li data-list-item-id="e444fdbad121d40088adda9de112ff8e2"><strong>Affected Versions:</strong><span> 14.2.0</span></li><li data-list-item-id="e638dbf5dc0a6731a77b93d63a56a2dd8"><strong>Severity:</strong><span> High</span></li><li data-list-item-id="e90e44a554e500e663df0dd5637618f76"><strong>Suggested CVSS: </strong><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="e340959677af5b4f3a503b6d222185651"><strong>References: </strong><a href="https://www.cve.org/CVERecord?id=CVE-2026-6553" target="_blank" rel="noreferrer"><span>CVE-2026-6553</span></a><span>,</span><a href="https://cwe.mitre.org/data/definitions/312.html" target="_blank" rel="noreferrer"><span> CWE-312</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>The backend user settings module (<i>SetupModuleController</i>) incorrectly conflates entity data (like passwords or email address) with user-interface settings (like theme, display options) when persisting changes. As a result, passwords were stored in cleartext in the <i>uc</i> and <i>user_settings</i> fields of the <i>be_users</i> database table.</p>
<p>The cleartext data was only persisted if users changed their credentials in the backend user settings module when the TYPO3 14.2.0 release was used (not in any other version).</p>
<h3>Solution</h3>
<p>Update to TYPO3 version 14.3.0 LTS that fixes the problem described.</p><div class="well"><p><strong>Manual actions required</strong></p>
<p>Updating to the patched release does not retroactively clean existing data. It is recommended to execute all <strong>User Settings</strong> upgrade wizards in the TYPO3 Install Tool, including the dedicated <strong>User Settings Scrubbing</strong> wizard, which sanitizes the incorrectly persisted cleartext values from the <i>uc</i> and <i>user_settings</i> fields of the <i>be_users</i> table. <strong>Additionally, affected backend user accounts should be assigned new passwords.</strong></p>
<p>Admin Tools → Upgrade → Upgrade Wizard → User Settings Scrubbing</p></div><h3>Credits</h3>
<p>Thanks to Martin Clewing for reporting this issue, and to TYPO3 core team members Oliver Hader, Stefan Bürk and Garvin Hicking for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2922</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:02:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-007: Authentication Bypass in extension &quot;E-Mail MFA Provider&quot; (mfa_email)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-007
                        
                    </link>
                    <description>It has been discovered that the extension &quot;E-Mail MFA Provider&quot; (mfa_email) is vulnerable to Authentication Bypass.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ebd5e708cb6b6d08191e960b3ff96eb40"><span>Updated: March 22, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mfa_email" target="_blank" rel="noreferrer"><span>"E-Mail MFA Provider" (mfa_email)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: ralffreit/mfa-email</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Authentication Bypass</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 2.0.0, 1.0.5 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: High</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-4208" target="_blank" rel="noreferrer"><span>CVE-2026-4208</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer"><span>CWE-288</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.<br><br>The vulnerability is only exploitable, when the “E-Mail MFA Provider” is not the default MFA provider and when at least one other MFA provider is available to the user.</p>
<h3>Solution</h3>
<p>Updated versions 2.0.1 and 1.0.7 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mfa_email/2.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mfa_email/2.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/mfa_email/1.0.7/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mfa_email/1.0.7/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Jan Holtkötter for reporting the vulnerability and to Ralf Freit for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2921</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:01:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-006: Broken Access Control in extension &quot;Redirect Tab&quot; (redirect_tab)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-006
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Redirect Tab&quot; (redirect_tab) is vulnerable to Broken Access Control.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/redirect_tab" target="_blank" rel="noreferrer"><span>"Redirect Tab" (redirect_tab)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: ayacoo/redirect-tab</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Broken Access Control</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 4.0.0 - 4.0.4, 3.0.0 - 3.1.6, 2.1.1 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Low</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-4202" target="_blank" rel="noreferrer"><span>CVE-2026-4202</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><span>CWE-200</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to verify, if an authenticated user has permissions to access redirects resulting in exposure of redirect records when editing a page.</p>
<h3>Solution</h3>
<p>Updated versions 4.0.5, 3.1.7 and 2.1.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/redirect_tab/4.0.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/4.0.5/zip</a><br><a href="https://extensions.typo3.org/extension/download/redirect_tab/3.1.7/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/3.1.7/zip</a><br><a href="https://extensions.typo3.org/extension/download/redirect_tab/2.1.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/2.1.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Guido Schmechel for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2920</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:00:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-005: Insecure Deserialization in extension &quot;Mailqueue&quot; (mailqueue)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-005
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Mailqueue&quot; (mailqueue) is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mailqueue" target="_blank" rel="noreferrer"><span>"Mailqueue" (mailqueue)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: cpsit/typo3-mailqueue</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 0.5.0 - 0.5.1, 0.4.4 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Medium</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-1323" target="_blank" rel="noreferrer"><span>CVE-2026-1323</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at <i>$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath']</i>.</p>
<h3>Solution</h3>
<p>Updated versions 0.5.2 and 0.4.5 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mailqueue/0.4.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.4.5/zip</a><br><a href="https://extensions.typo3.org/extension/download/mailqueue/0.5.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.5.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2919</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:33:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-004: Vulnerability in bundled package in extension &quot;Amazon AWS SDK&quot; (aws)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-004
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Amazon AWS SDK&quot; (aws) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e3ca3333198c36af2fd116b821b7e0af8"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="e2e1f6e8bddf04f9b95100293f803524f"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e661ee032672ec763c28c0831e8061b4e"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws" target="_blank" rel="noreferrer"><span>"Amazon AWS SDK" (aws)</span></a></li><li data-list-item-id="e2d798191bbc9e9ea700f90aecd3f1bb5"><span>Composer Package Name: Not available</span></li><li data-list-item-id="e2872d085ccb6082e4db5725ab7cbd6e9"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="e88535c8ef18fd613c27e1e2da32e2e5c"><span>Affected Versions: 3.161.2 and below</span></li><li data-list-item-id="e341d65666753098c39e9821b32494bb5"><span>Severity: Medium</span></li><li data-list-item-id="e3cedc22fbc7625846215c05971115953"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e097459f2a8097cbedaa9d7f74a368b70"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known <a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>All versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository, because the extension is outdated and unmaintained.</p>
<p>Please uninstall and delete the extension folder from your installation and search on the <a href="https://extensions.typo3.org/" target="_blank" rel="noreferrer">TYPO3 Extension Repository</a> for alternative extensions.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2918</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:32:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-003: Vulnerability in bundled package in extension &quot;Amazon Web Services (AWS) Toolbox&quot; (aws_tools)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-003
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Amazon Web Services (AWS) Toolbox&quot; (aws_tools) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e68eddd3f5f818f06ee7b18e1278fd58a"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="ec311413d61e5fda7f1c66e04f370d5da"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e4c55d1ec08bca51be3ad9df1a6019c7f"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws_tools" target="_blank" rel="noreferrer"><span>"Amazon Web Services (AWS) Toolbox" (aws_tools)</span></a></li><li data-list-item-id="e39346112cd370770858c561eed5b2b8e"><span>Composer Package Name: leuchtfeuer/aws-tools</span></li><li data-list-item-id="ed28d54da964c83c2caea823c7b44a877"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="eacd4f3c3010bde5b36ae3bf18597f151"><span>Affected Versions: 12.0.0 - 12.0.1, 11.0.3 and below</span></li><li data-list-item-id="e014b525b304bec883eaf4c97bc9f2ada"><span>Severity: Medium</span></li><li data-list-item-id="e9b3f616f1769e9b8f954e6f8f63d5097"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a>&nbsp;</li><li data-list-item-id="e031b90408707bd643842a86c962bec2e"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known <a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>Updated versions 11.0.4 and 12.0.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/aws_tools/11.0.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_tools/11.0.3/zip</a><br><a href="https://extensions.typo3.org/extension/download/aws_tools/12.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_tools/12.0.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability and to Leuchtfeuer Digital Marketing for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2917</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:31:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-002: Vulnerability in bundled package in extension &quot;AWS SDK for PHP&quot; (aws_sdk_php)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-002
                        
                    </link>
                    <description>It has been discovered that the extension &quot;AWS SDK for PHP&quot; (aws_sdk_php) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="eb2ff0509cafaf0fe3a9606b2c01a2347"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="e1506c86cc48d029d296b5a531cb91a05"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="ef8b8d02aba5cf9432b7b88c6f1cef90c"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws_sdk_php" target="_blank" rel="noreferrer"><span>"AWS SDK for PHP" (aws_sdk_php)</span></a></li><li data-list-item-id="e7f8586bbaef4fd93d9bec881074b88c8"><span>Composer Package Name: Not available</span></li><li data-list-item-id="e5aeef3fd39471d098759a66b15a70bdd"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="ec54b33b99ee0d02088bf7c46bbca5f30"><span>Affected Versions: 3.367.3 and below</span></li><li data-list-item-id="eeeb51fbe6d13e1cc471c67bbf1236388"><span>Severity: Medium</span></li><li data-list-item-id="e094f503436dfbd112ef67a7796dbb71a"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e067db440cd5aa32c284d5a99fae02e77"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known&nbsp;<a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>An updated version 3.368.0 is available from the TYPO3 extension manager at</p>
<p><a href="https://extensions.typo3.org/extension/download/aws_sdk_php/3.368.0/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_sdk_php/3.368.0/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability and for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2916</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:30:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-001: Insecure Deserialization in extension &quot;Mailqueue&quot; (mailqueue)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-001
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Mailqueue&quot; (mailqueue) is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mailqueue" target="_blank" rel="noreferrer"><span>"Mailqueue" (mailqueue)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: cpsit/typo3-mailqueue</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 0.5.0, 0.4.2 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Medium</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-0895" target="_blank" rel="noreferrer"><span>CVE-2026-0895</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The extension extends TYPO3’s <i>FileSpool</i> component, which was vulnerable to Insecure Deserialization prior to <a href="https://typo3.org/security/advisory/typo3-core-sa-2026-004" target="_blank">TYPO3-CORE-SA-2026-004</a>. Since the related fix is overwritten by the extension, using the extension with a patched TYPO3 core version still allows for Insecure Deserialization, because the affected vulnerable code was extracted from TYPO3 core to the extension.</p>
<p>More information about this vulnerability can be found in the related TYPO3 Core Security Advisory <a href="https://typo3.org/security/advisory/typo3-core-sa-2026-004" target="_blank">TYPO3-CORE-SA-2026-004</a>.</p>
<h3>Solution</h3>
<p>Updated versions 0.5.1 and 0.4.3 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mailqueue/0.4.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.4.3/zip</a><br><a href="https://extensions.typo3.org/extension/download/mailqueue/0.5.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.5.1/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2915</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:04:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-004: Insecure Deserialization via Mailer File Spool</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-004
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e19a22fd5f2448887ed47bef1e4b51bb0"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e0208624d8eb95d117a8ff4313f214412"><strong>Subcomponent:</strong><span> Mailer (ext:core)</span></li><li data-list-item-id="e973120566f84cd3a16118065b2303888"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e7e566f60a6566e14ce0746d014658394"><strong>Vulnerability Type:</strong><span> Insecure Deserialization</span></li><li data-list-item-id="e69d7b2ec24ed2c428bd9cd754695e50e"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e704b14bd7dab80aeaf93caf5324caae6"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="e15d4b9bd0b203f02aeb5b72ed6c82ad2"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="e37674feff28faf016a4207fe60d0c60f"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2026-0859" target="_blank" rel="noreferrer"><span>CVE-2026-0859</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Local platform users who can write to TYPO3’s mail‑file spool directory can craft a file that the system will automatically deserialize without any class restrictions. This flaw allows an attacker to inject and execute arbitrary PHP code in the public scope of the web server.</p>
<p>The vulnerability is triggered when TYPO3 is configured with&nbsp;<i>$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_type'] = 'file';</i> and a scheduler task or cron job runs the command&nbsp;<i>mailer:spool:send</i>. The spool‑send operation performs the insecure deserialization that is at the core of this issue.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Vitaly Simonovich for reporting this issue, and to TYPO3 security team members Elias Häußler and Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2914</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:03:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-003: Broken Access Control in Recycler Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-003
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e6a5cfa81fa300838f2229b87af1d8834"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e34040650a30f1202a72e60a5e7ad01b2"><strong>Subcomponent:</strong><span> Recycler (ext:recycler)</span></li><li data-list-item-id="e65c5bd22870efc1bd1797712baf1a791"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="eea4bf3470c5d461fc3b0dde4f1830f58"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e7475d202fd64ff778b11c925ab9ac187"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="ee0e27fffca83476430bbe43587aa2866"><strong>Severity:</strong><span> High</span></li><li data-list-item-id="e3d90aa13d49b5d6c806564404cb4ef51"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e91194b83043314b3faef48005373c41b"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59022" target="_blank" rel="noreferrer"><span>CVE-2025-59022</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Backend users who had access to the recycler module could delete arbitrary data from any database table defined in the TCA - regardless of whether they had permission to that particular table. This allowed attackers to purge and destroy critical site data, effectively rendering the website unavailable.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Sven Jürgens and Daniel Windloff for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2913</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:02:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-002: Broken Access Control in Redirects Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-002
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e3b60e9d8367b96b77cc671da040028eb"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e8886676dfbcf00b5fc519629aa2b9ff0"><strong>Subcomponent:</strong><span> Redirects (ext:redirects)</span></li><li data-list-item-id="ee6c94aaace50051a9bddbab4930c8e9e"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e512ea143346e66de9c75e5f6f9ae16c3"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e8dfb8dc660f22da5cdeb4746bb2d7116"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e2e2039a889ce0d08c6b4e423e021d2cd"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="e7f2dfb57ee596e19e87e046241770ce6"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ea038edf4a25ea603e632dae8f2a26069"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59021" target="_blank" rel="noreferrer"><span>CVE-2025-59021</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Backend users with access to the redirects module and write permission on the&nbsp;<i>sys_redirect</i> table were able to&nbsp; read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2912</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:01:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-001: Broken Access Control in Edit Document Controller</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-001
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e38ec0093ccae4726e7a4b1e3358061a3"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e5d64cafeb60c4072739b6bc7c60ac470"><strong>Subcomponent:</strong><span> Edit Document Controller (ext:backend)</span></li><li data-list-item-id="ef0d131a6779ba23c39fbb55d19d0943b"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e97664cdf3ce3f0d7da26d9de02386030"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e270407485a77ef5fc50e756e5ea72bbe"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e6f9be898214e953ebf7ed9492a372d0e"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="ef82111015c6414359d7ad3cf945f7b95"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L</span></a></li><li data-list-item-id="e0184103c9e75f3a9d82c742f1713563e"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59020" target="_blank" rel="noreferrer"><span>CVE-2025-59020</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer"><span>CWE-863</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>By exploiting the <i>defVals</i> parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Daniel Windloff for reporting this issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2911</guid>
                    <pubDate>
                        Wed, 17 Dec 2025 10:00:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-016: Vulnerability in bundled package in extension &quot;Single Sign-on with SAML&quot; (md_saml)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-016
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Single Sign-on with SAML&quot; (md_saml) bundles a vulnerable version of “onelogin/php-saml“ which is susceptible to Authentication Bypass.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e3309c81c1c20d055b44f723ed89dbf3d">Release Date: <span>December 17, 2025</span></li><li data-list-item-id="ed103b786124e0ccbf3f27dd90b7867e4">Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li data-list-item-id="ed62a79e1af0380b0c1809a95a6fe4540">Component: <a href="https://extensions.typo3.org/extension/md_saml" target="_blank" rel="noreferrer"><span>"Single Sign-on with SAML" (md_saml)</span></a></li><li data-list-item-id="eff75dec0df436b856751802274c2ffce">Composer Package Name: <a href="https://packagist.org/packages/mediadreams/md_saml" target="_blank" rel="noreferrer"><span>mediadreams/md_saml</span></a></li><li data-list-item-id="e948f27fb159f551d4cc401fbe0d7102b">Vulnerability Type: <span>Authentication Bypass</span></li><li data-list-item-id="e815c0e117ca0618cc6757993481092ed">Affected Versions: <span>3.0.7 and below, 4.0.0 - 4.0.4</span></li><li data-list-item-id="e8042a3c696b178387eca8f2a0a7483af">Severity: Critical</li><li data-list-item-id="ec7513ca012eed99fbcc0d4b651d7601a">Suggested <span>CVSS v4.0:</span> <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ed715eeef4066315254f1ffbf65c7cef4">References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-66475" target="_blank" rel="noreferrer"><span>CVE-2025-66475</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “onelogin/php-saml”, which is affected by a&nbsp;<a href="https://github.com/advisories/GHSA-5j8p-438x-rgg5" target="_blank" rel="noreferrer">Authentication Bypass vulnerability</a> via a Signature Validation Bypass vulnerability in “robrichards/xmlseclibs”.</p>
<h3>Solution</h3>
<p>Updated versions 3.0.8 and 4.0.5 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/md_saml/3.0.8/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/md_saml/3.0.8/zip</a><br><a href="https://extensions.typo3.org/extension/download/md_saml/4.0.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/md_saml/4.0.5/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Christoph Daecke&nbsp; for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2908</guid>
                    <pubDate>
                        Wed, 12 Nov 2025 11:31:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-015: Broken Authentication in extension &quot;Modules&quot; (modules)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-015
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Modules&quot; (modules) is susceptible to Broken Authentication.
</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: November 12, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/modules" target="_blank" rel="noreferrer"><u>“Modules” (modules)</u></a></li><li>Composer Package Name: codingms/modules</li><li>Vulnerability Type: Broken Authentication</li><li>Affected Versions: 4.3.10 and below, 5.0.0 - 5.7.3, 6.0.0 - 6.4.1, 7.0.0 - 7.5.4</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-12998" target="_blank" rel="noreferrer"><u>CVE-2025-12998</u></a>, <a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><u>CWE-862</u></a></li></ul><h3>Problem Description</h3>
<p>The extension provides a feature to login as a frontend user for authenticated backend users by calling a special URL. The implemented access check can however be bypassed, if the extension setting <i>“module.frontendUser.allowNonAdminUsersToLoginAsFrontendUser”</i> is enabled, resulting in an unauthenticated remote user to login as any frontend user.</p>
<h3>Solution</h3>
<p>Updated versions 4.3.11, 5.7.4, 6.4.2 and 7.5.5 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/modules/4.3.11/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/4.3.11/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/5.7.4/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/5.7.4/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/6.4.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/6.4.2/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/7.5.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/7.5.5/zip</a>&nbsp;</p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Thomas Deuling for reporting the vulnerability and &nbsp;for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2907</guid>
                    <pubDate>
                        Wed, 12 Nov 2025 11:30:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-014: Vulnerability in bundled package in extension &quot;Forms Export&quot; (frp_form_answers)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-014
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Forms Export&quot; (frp_form_answers) bundles a vulnerable version of &quot;phpoffice/phpspreadsheet&quot;, which is susceptible to Server-Side Request Forgery.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: November 12, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/frp_form_answers" target="_blank" rel="noreferrer"><u>“Forms Export” (frp_form_answers)</u></a></li><li>Composer Package Name: frappant/frp-form-answers</li><li>Vulnerability Type: Server-Side Request Forgery</li><li>Affected Versions: 5.0.3 and below, 6.0.0 - 6.1.1</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-54370" target="_blank" rel="noreferrer"><u>CVE-2025-54370</u></a>, <a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer"><u>CWE-918</u></a></li></ul><h3>Problem Description</h3>
<p>The TER extension bundles the PHP package “<a href="https://packagist.org/packages/phpoffice/phpspreadsheet" target="_blank" rel="noreferrer">phpoffice/phpspreadsheet</a>”, which is affected by a Server-Side Request Forgery vulnerability.</p>
<p class="alert alert-warning"><strong>Note:</strong> The extension does <strong>not</strong> bundle the PHP package “phpoffice/phpspreadsheet” anymore. The Excel Export feature does only work, when the extension is installed via composer.</p>
<h3>Solution</h3>
<p>Updated versions 5.0.4 and 6.1.2 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/frp_form_answers/5.0.4/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/frp_form_answers/5.0.4/zip</u></a><br><a href="https://extensions.typo3.org/extension/download/frp_form_answers/6.1.2/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/frp_form_answers/6.1.2/zip</u></a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Mikel Wohlschlegel for reporting the vulnerability and to Jonas Hirschi for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2877</guid>
                    <pubDate>
                        Tue, 16 Sep 2025 10:31:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-013: Vulnerability in bundled package in extension &quot;Base Excel&quot; (base_excel)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-013
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Base Excel&quot; (base_excel) bundles a vulnerable version of “phpoffice/phpspreadsheet“ which is susceptible to Server-Side Request Forgery.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: September 16, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/base_excel" target="_blank" rel="noreferrer"><u>"Base Excel" (base_excel)</u></a></li><li>Composer Package Name: jambagecom/base-excel</li><li>Vulnerability Type: Server-Side Request Forgery</li><li>Affected Versions: 4.5.0 and below</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-54370" target="_blank" rel="noreferrer"><u>CVE-2025-54370</u></a>, <a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer"><u>CWE-918</u></a></li></ul><h3>Problem Description</h3>
<p>The TER extension bundles the PHP package “<a href="https://packagist.org/packages/phpoffice/phpspreadsheet" target="_blank" rel="noreferrer">phpoffice/phpspreadsheet</a>”, which is affected by a Server-Side Request Forgery vulnerability.</p>
<h3>Solution</h3>
<p>An updated version 5.1.0 is available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/base_excel/5.1.0/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/base_excel/5.1.0/zip</u></a><br><br>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Franz Holzinger &nbsp;for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2876</guid>
                    <pubDate>
                        Tue, 16 Sep 2025 10:30:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-012: Cross-Site Scripting in extension &quot;Form to Database&quot; (form_to_database)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-012
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Form to Database&quot; (form_to_database) is susceptible to Cross-Site Scripting.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: September 16, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/form_to_database" target="_blank" rel="noreferrer"><u>"Form to Database" (form_to_database)</u></a></li><li>Composer Package Name: lavitto/typo3-form-to-database</li><li>Vulnerability Type: Cross-Site Scripting</li><li>Affected Versions: 2.2.4 and below, 3.0.0 - 3.2.1, 4.0.0 - 4.2.2, 5.0.0 - 5.0.1</li><li>Severity: Low</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-10316" target="_blank" rel="noreferrer"><u>CVE-2025-10316</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer"><u>CWE-79</u></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly encode user input for output in HTML context in TYPO3 backend user interface.</p>
<h3>Solution</h3>
<p>Updated versions 2.2.5, 3.2.2, 4.2.3 and 5.0.2 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/form_to_database/2.2.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/2.2.5/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/3.2.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/3.2.2/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/4.2.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/4.2.3/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/5.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/5.0.2/zip</a> &nbsp; &nbsp;</p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Sascha Egerer for reporting the vulnerability and to Liquid Light for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2873</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:07:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-023: Information Disclosure via CSV Download</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-023
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> List Module (ext:backend, ext:recordlist)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59019" target="_blank" rel="noreferrer"><u>CVE-2025-59019</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><u>CWE-200</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>The CSV download feature in the backend user interface allowed callers to request arbitrary data from the database without performing a permission check on the target table. Consequently, a backend user without rights to a particular database table could retrieve records, leading to information disclosure. This vulnerability was limited to database records that fell within the page tree the user was already permitted to access.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security team member Oliver Hader for reporting the issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2872</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:06:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-022: Information Disclosure in Workspaces Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-022
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Workspaces Module (ext:workspaces)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> High</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59018" target="_blank" rel="noreferrer"><u>CVE-2025-59018</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><u>CWE-200</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>In addition to the vulnerability documented in TYPO3‑CORE‑SA‑2025‑021 (CVE‑2025‑59017), any authenticated backend user could invoke a backend AJAX route belonging to the workspaces module.</p>
<p>The route allowed the caller to request arbitrary data from the database, without performing a permission check on the target table. Consequently, a backend user without rights to a particular database table could retrieve sensitive records, leading to information disclosure.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security team member Oliver Hader for reporting and fixing this issue.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2871</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:05:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-021: Broken Access Control in Backend AJAX Routes</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-021
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Backend Routing (ext:backend)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Broken Access Control</li><li><strong>Affected Versions:</strong>9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59017" target="_blank" rel="noreferrer"><u>CVE-2025-59017</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><u>CWE-862</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Dedicated AJAX routes used by TYPO3 backend modules were not protected by the same permission checks that guard the modules themselves. As a result, an authenticated backend user could directly call these routes - even if the user had no permissions to the corresponding module.<br>This allowed users to read, modify, or delete data directly - effectively bypassing module‑level restrictions.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<p>The AJAX route property <a href="https://docs.typo3.org/permalink/changelog:important-106983-1750962567@main" target="_blank" rel="noreferrer"><i><u>inheritAccessFromModule</u></i></a> is introduced. When this property is set, a route is explicitly bound to the permissions of a specified backend module.</p>
<p>In general, developers are advised to always verify authorization on target resources (pages, database tables, files, etc.) within the corresponding AJAX handler or controller. More details are available at <a href="https://docs.typo3.org/permalink/t3coreapi:be-user-check" target="_blank" rel="noreferrer"><u>https://docs.typo3.org/permalink/t3coreapi:be-user-check</u></a>.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting and fixing this issue.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2870</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:04:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-020: Information Disclosure via File Abstraction Layer</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-020
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> File Abstraction Layer (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59016" target="_blank" rel="noreferrer"><u>CVE-2025-59016</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer"><u>CWE-209</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>When specific low‑level file‑system operations fail during execution through the File Abstraction Layer, the full path of the affected resource is disclosed. Exploiting this vulnerability requires a valid backend user account.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Dmitry Petschke and Marc Willmann for reporting this issue, and to TYPO3 core team member Andreas Kienast for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2869</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:03:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-019: Insufficient Entropy in Password Generation</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-019
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to insufficient entropy.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Crypto (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Insufficient Entropy</li><li><strong>Affected Versions:&nbsp;</strong>12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59015" target="_blank" rel="noreferrer"><u>CVE-2025-59015</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/331.html" target="_blank" rel="noreferrer"><u>CWE-331</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>By default, the Password Generation component creates a password that always begins with a deterministic three‑character prefix (<i>lower‑case, upper‑case, digit</i>). Consequently, the effective entropy of the generated passwords is lower than expected. Invocations that employ the <i>random</i> password rules are unaffected.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Mathias Brodala for reporting this issue, and to TYPO3 core &amp; security team member Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2868</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:02:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-018: Denial of Service in TYPO3 Bookmark Toolbar</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-018
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to denial of service.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Bookmark Toolbar (ext:backend)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Denial of Service</li><li><strong>Affected Versions:</strong> 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59014" target="_blank" rel="noreferrer"><u>CVE-2025-59014</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer"><u>CWE-248</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Due to insufficient input validation, manipulated data saved in the bookmark toolbar of the backend user interface causes a general error state, blocking further access to the interface. Exploiting this vulnerability requires an administrator-level backend user account.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Jakub Świes for reporting this issue, and to TYPO3 core &amp; security team member Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2867</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:01:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-017: Open Redirect in TYPO3 CMS</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-017
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to open redirect.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Core Utilities (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Open Redirect</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59013" target="_blank" rel="noreferrer"><u>CVE-2025-59013</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/601.html" target="_blank" rel="noreferrer"><u>CWE-601</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Applications that use <i>TYPO3\CMS\Core\Utility\GeneralUtility::sanitizeLocalUrl</i> to allow only local URLs are vulnerable to open redirect attacks if the URL is used after it has passed the aforementioned sanitization checks. This enables attackers to redirect users to external content and carry out phishing attacks.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security&nbsp; team member Oliver Hader for reporting this issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
        
    </channel>
</rss>
