<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:f="http://typo3.org/ns/TYPO3/CMS/Fluid/ViewHelpers"
     xmlns:n="http://typo3.org/ns/GeorgRinger/News/ViewHelpers">
    <channel>
        <title>Official typo3.org security advisories</title>
        <link>https://typo3.org/security</link>
        <description></description>
        <language>en-gb</language>
        
            <copyright>TYPO3 News</copyright>
        
        <pubDate>
            Sun, 12 Apr 2026 11:35:42 +0200
        </pubDate>
        <lastBuildDate>
            Sun, 12 Apr 2026 11:35:42 +0200
        </lastBuildDate>
        
        <atom:link href="https://typo3.org/rss-security" rel="self"
                   type="application/rss+xml"/>
        <generator>TYPO3 EXT:news</generator>
        
            
                <item>
                    <guid isPermaLink="false">news-2922</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:02:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-007: Authentication Bypass in extension &quot;E-Mail MFA Provider&quot; (mfa_email)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-007
                        
                    </link>
                    <description>It has been discovered that the extension &quot;E-Mail MFA Provider&quot; (mfa_email) is vulnerable to Authentication Bypass.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ebd5e708cb6b6d08191e960b3ff96eb40"><span>Updated: March 22, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mfa_email" target="_blank" rel="noreferrer"><span>"E-Mail MFA Provider" (mfa_email)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: ralffreit/mfa-email</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Authentication Bypass</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 2.0.0, 1.0.5 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: High</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-4208" target="_blank" rel="noreferrer"><span>CVE-2026-4208</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" rel="noreferrer"><span>CWE-288</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.<br><br>The vulnerability is only exploitable, when the “E-Mail MFA Provider” is not the default MFA provider and when at least one other MFA provider is available to the user.</p>
<h3>Solution</h3>
<p>Updated versions 2.0.1 and 1.0.7 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mfa_email/2.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mfa_email/2.0.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/mfa_email/1.0.7/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mfa_email/1.0.7/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Jan Holtkötter for reporting the vulnerability and to Ralf Freit for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2921</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:01:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-006: Broken Access Control in extension &quot;Redirect Tab&quot; (redirect_tab)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-006
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Redirect Tab&quot; (redirect_tab) is vulnerable to Broken Access Control.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/redirect_tab" target="_blank" rel="noreferrer"><span>"Redirect Tab" (redirect_tab)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: ayacoo/redirect-tab</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Broken Access Control</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 4.0.0 - 4.0.4, 3.0.0 - 3.1.6, 2.1.1 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Low</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-4202" target="_blank" rel="noreferrer"><span>CVE-2026-4202</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><span>CWE-200</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to verify, if an authenticated user has permissions to access redirects resulting in exposure of redirect records when editing a page.</p>
<h3>Solution</h3>
<p>Updated versions 4.0.5, 3.1.7 and 2.1.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/redirect_tab/4.0.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/4.0.5/zip</a><br><a href="https://extensions.typo3.org/extension/download/redirect_tab/3.1.7/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/3.1.7/zip</a><br><a href="https://extensions.typo3.org/extension/download/redirect_tab/2.1.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/redirect_tab/2.1.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Guido Schmechel for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2920</guid>
                    <pubDate>
                        Tue, 17 Mar 2026 10:00:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-005: Insecure Deserialization in extension &quot;Mailqueue&quot; (mailqueue)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-005
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Mailqueue&quot; (mailqueue) is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: March 17, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mailqueue" target="_blank" rel="noreferrer"><span>"Mailqueue" (mailqueue)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: cpsit/typo3-mailqueue</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 0.5.0 - 0.5.1, 0.4.4 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Medium</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-1323" target="_blank" rel="noreferrer"><span>CVE-2026-1323</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at <i>$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath']</i>.</p>
<h3>Solution</h3>
<p>Updated versions 0.5.2 and 0.4.5 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mailqueue/0.4.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.4.5/zip</a><br><a href="https://extensions.typo3.org/extension/download/mailqueue/0.5.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.5.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2919</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:33:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-004: Vulnerability in bundled package in extension &quot;Amazon AWS SDK&quot; (aws)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-004
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Amazon AWS SDK&quot; (aws) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e3ca3333198c36af2fd116b821b7e0af8"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="e2e1f6e8bddf04f9b95100293f803524f"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e661ee032672ec763c28c0831e8061b4e"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws" target="_blank" rel="noreferrer"><span>"Amazon AWS SDK" (aws)</span></a></li><li data-list-item-id="e2d798191bbc9e9ea700f90aecd3f1bb5"><span>Composer Package Name: Not available</span></li><li data-list-item-id="e2872d085ccb6082e4db5725ab7cbd6e9"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="e88535c8ef18fd613c27e1e2da32e2e5c"><span>Affected Versions: 3.161.2 and below</span></li><li data-list-item-id="e341d65666753098c39e9821b32494bb5"><span>Severity: Medium</span></li><li data-list-item-id="e3cedc22fbc7625846215c05971115953"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e097459f2a8097cbedaa9d7f74a368b70"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known <a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>All versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository, because the extension is outdated and unmaintained.</p>
<p>Please uninstall and delete the extension folder from your installation and search on the <a href="https://extensions.typo3.org/" target="_blank" rel="noreferrer">TYPO3 Extension Repository</a> for alternative extensions.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2918</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:32:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-003: Vulnerability in bundled package in extension &quot;Amazon Web Services (AWS) Toolbox&quot; (aws_tools)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-003
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Amazon Web Services (AWS) Toolbox&quot; (aws_tools) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e68eddd3f5f818f06ee7b18e1278fd58a"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="ec311413d61e5fda7f1c66e04f370d5da"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e4c55d1ec08bca51be3ad9df1a6019c7f"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws_tools" target="_blank" rel="noreferrer"><span>"Amazon Web Services (AWS) Toolbox" (aws_tools)</span></a></li><li data-list-item-id="e39346112cd370770858c561eed5b2b8e"><span>Composer Package Name: leuchtfeuer/aws-tools</span></li><li data-list-item-id="ed28d54da964c83c2caea823c7b44a877"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="eacd4f3c3010bde5b36ae3bf18597f151"><span>Affected Versions: 12.0.0 - 12.0.1, 11.0.3 and below</span></li><li data-list-item-id="e014b525b304bec883eaf4c97bc9f2ada"><span>Severity: Medium</span></li><li data-list-item-id="e9b3f616f1769e9b8f954e6f8f63d5097"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a>&nbsp;</li><li data-list-item-id="e031b90408707bd643842a86c962bec2e"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known <a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>Updated versions 11.0.4 and 12.0.2 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/aws_tools/11.0.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_tools/11.0.3/zip</a><br><a href="https://extensions.typo3.org/extension/download/aws_tools/12.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_tools/12.0.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability and to Leuchtfeuer Digital Marketing for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2917</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:31:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-002: Vulnerability in bundled package in extension &quot;AWS SDK for PHP&quot; (aws_sdk_php)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-002
                        
                    </link>
                    <description>It has been discovered that the extension &quot;AWS SDK for PHP&quot; (aws_sdk_php) bundles a vulnerable version of “aws/aws-sdk-php“ which is susceptible to use of a Broken or Risky Cryptographic Algorithm.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="eb2ff0509cafaf0fe3a9606b2c01a2347"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="e1506c86cc48d029d296b5a531cb91a05"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="ef8b8d02aba5cf9432b7b88c6f1cef90c"><span>Component: </span><a href="https://extensions.typo3.org/extension/aws_sdk_php" target="_blank" rel="noreferrer"><span>"AWS SDK for PHP" (aws_sdk_php)</span></a></li><li data-list-item-id="e7f8586bbaef4fd93d9bec881074b88c8"><span>Composer Package Name: Not available</span></li><li data-list-item-id="e5aeef3fd39471d098759a66b15a70bdd"><span>Vulnerability Type: Broken or Risky Cryptographic Algorithm</span></li><li data-list-item-id="ec54b33b99ee0d02088bf7c46bbca5f30"><span>Affected Versions: 3.367.3 and below</span></li><li data-list-item-id="eeeb51fbe6d13e1cc471c67bbf1236388"><span>Severity: Medium</span></li><li data-list-item-id="e094f503436dfbd112ef67a7796dbb71a"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e067db440cd5aa32c284d5a99fae02e77"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2025-14761" target="_blank" rel="noreferrer"><span>CVE-2025-14761</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/327.html" target="_blank" rel="noreferrer"><span>CWE-327</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “aws/aws-sdk-php”, which contains a known&nbsp;<a href="https://aws.amazon.com/de/security/security-bulletins/rss/aws-2025-032/" target="_blank" rel="noreferrer">Broken or Risky Cryptographic Algorithm</a> vulnerability.</p>
<h3>Solution</h3>
<p>An updated version 3.368.0 is available from the TYPO3 extension manager at</p>
<p><a href="https://extensions.typo3.org/extension/download/aws_sdk_php/3.368.0/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/aws_sdk_php/3.368.0/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Michael Schams &nbsp;for reporting the vulnerability and for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2916</guid>
                    <pubDate>
                        Tue, 20 Jan 2026 08:30:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2026-001: Insecure Deserialization in extension &quot;Mailqueue&quot; (mailqueue)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2026-001
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Mailqueue&quot; (mailqueue) is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e36e1b228f6202dad35741a413606c198"><span>Release Date: January 20, 2026</span></li><li data-list-item-id="ed4951ecd4b9bcdf25f8ffaadb1630d8a"><span>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</span></li><li data-list-item-id="e0e309f23f9180873e80e110ea92603e5"><span>Component: </span><a href="https://extensions.typo3.org/extension/mailqueue" target="_blank" rel="noreferrer"><span>"Mailqueue" (mailqueue)</span></a></li><li data-list-item-id="e001388e94f39e51f31c8744b3513488a"><span>Composer Package Name: cpsit/typo3-mailqueue</span></li><li data-list-item-id="e483dfef8967de7b442afa15366a6b23a"><span>Vulnerability Type: Insecure Deserialization</span></li><li data-list-item-id="e750c46fa3f5eec25c07c174915fc3e08"><span>Affected Versions: 0.5.0, 0.4.2 and below</span></li><li data-list-item-id="e3aeed78b72298effbc48f611573e4906"><span>Severity: Medium</span></li><li data-list-item-id="e4bcd2104382a4f3eaa6bb00c40c0ef65"><span>Suggested CVSS v4.0: </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="ede48a65b14529bacca186cc9d26b2259"><span>References: </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-0895" target="_blank" rel="noreferrer"><span>CVE-2026-0895</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><h3>Problem Description</h3>
<p>The extension extends TYPO3’s <i>FileSpool</i> component, which was vulnerable to Insecure Deserialization prior to <a href="https://typo3.org/security/advisory/typo3-core-sa-2026-004" target="_blank">TYPO3-CORE-SA-2026-004</a>. Since the related fix is overwritten by the extension, using the extension with a patched TYPO3 core version still allows for Insecure Deserialization, because the affected vulnerable code was extracted from TYPO3 core to the extension.</p>
<p>More information about this vulnerability can be found in the related TYPO3 Core Security Advisory <a href="https://typo3.org/security/advisory/typo3-core-sa-2026-004" target="_blank">TYPO3-CORE-SA-2026-004</a>.</p>
<h3>Solution</h3>
<p>Updated versions 0.5.1 and 0.4.3 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/mailqueue/0.4.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.4.3/zip</a><br><a href="https://extensions.typo3.org/extension/download/mailqueue/0.5.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/mailqueue/0.5.1/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting the vulnerability and for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2915</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:04:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-004: Insecure Deserialization via Mailer File Spool</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-004
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is vulnerable to insecure deserialization.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e19a22fd5f2448887ed47bef1e4b51bb0"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e0208624d8eb95d117a8ff4313f214412"><strong>Subcomponent:</strong><span> Mailer (ext:core)</span></li><li data-list-item-id="e973120566f84cd3a16118065b2303888"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e7e566f60a6566e14ce0746d014658394"><strong>Vulnerability Type:</strong><span> Insecure Deserialization</span></li><li data-list-item-id="e69d7b2ec24ed2c428bd9cd754695e50e"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e704b14bd7dab80aeaf93caf5324caae6"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="e15d4b9bd0b203f02aeb5b72ed6c82ad2"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H</span></a></li><li data-list-item-id="e37674feff28faf016a4207fe60d0c60f"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2026-0859" target="_blank" rel="noreferrer"><span>CVE-2026-0859</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer"><span>CWE-502</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Local platform users who can write to TYPO3’s mail‑file spool directory can craft a file that the system will automatically deserialize without any class restrictions. This flaw allows an attacker to inject and execute arbitrary PHP code in the public scope of the web server.</p>
<p>The vulnerability is triggered when TYPO3 is configured with&nbsp;<i>$GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_type'] = 'file';</i> and a scheduler task or cron job runs the command&nbsp;<i>mailer:spool:send</i>. The spool‑send operation performs the insecure deserialization that is at the core of this issue.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Vitaly Simonovich for reporting this issue, and to TYPO3 security team members Elias Häußler and Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2914</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:03:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-003: Broken Access Control in Recycler Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-003
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e6a5cfa81fa300838f2229b87af1d8834"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e34040650a30f1202a72e60a5e7ad01b2"><strong>Subcomponent:</strong><span> Recycler (ext:recycler)</span></li><li data-list-item-id="e65c5bd22870efc1bd1797712baf1a791"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="eea4bf3470c5d461fc3b0dde4f1830f58"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e7475d202fd64ff778b11c925ab9ac187"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="ee0e27fffca83476430bbe43587aa2866"><strong>Severity:</strong><span> High</span></li><li data-list-item-id="e3d90aa13d49b5d6c806564404cb4ef51"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="e91194b83043314b3faef48005373c41b"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59022" target="_blank" rel="noreferrer"><span>CVE-2025-59022</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Backend users who had access to the recycler module could delete arbitrary data from any database table defined in the TCA - regardless of whether they had permission to that particular table. This allowed attackers to purge and destroy critical site data, effectively rendering the website unavailable.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Sven Jürgens and Daniel Windloff for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2913</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:02:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-002: Broken Access Control in Redirects Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-002
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e3b60e9d8367b96b77cc671da040028eb"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e8886676dfbcf00b5fc519629aa2b9ff0"><strong>Subcomponent:</strong><span> Redirects (ext:redirects)</span></li><li data-list-item-id="ee6c94aaace50051a9bddbab4930c8e9e"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e512ea143346e66de9c75e5f6f9ae16c3"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e8dfb8dc660f22da5cdeb4746bb2d7116"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e2e2039a889ce0d08c6b4e423e021d2cd"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="e7f2dfb57ee596e19e87e046241770ce6"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ea038edf4a25ea603e632dae8f2a26069"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59021" target="_blank" rel="noreferrer"><span>CVE-2025-59021</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><span>CWE-862</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Backend users with access to the redirects module and write permission on the&nbsp;<i>sys_redirect</i> table were able to&nbsp; read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2912</guid>
                    <pubDate>
                        Tue, 13 Jan 2026 12:01:00 +0100
                    </pubDate>
                    <title>TYPO3-CORE-SA-2026-001: Broken Access Control in Edit Document Controller</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2026-001
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li data-list-item-id="e38ec0093ccae4726e7a4b1e3358061a3"><strong>Component Type:</strong><span> TYPO3 CMS</span></li><li data-list-item-id="e5d64cafeb60c4072739b6bc7c60ac470"><strong>Subcomponent:</strong><span> Edit Document Controller (ext:backend)</span></li><li data-list-item-id="ef0d131a6779ba23c39fbb55d19d0943b"><strong>Release Date:</strong><span> January 13, 2026</span></li><li data-list-item-id="e97664cdf3ce3f0d7da26d9de02386030"><strong>Vulnerability Type:</strong><span> Broken Access Control</span></li><li data-list-item-id="e270407485a77ef5fc50e756e5ea72bbe"><strong>Affected Versions:</strong><span> 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1</span></li><li data-list-item-id="e6f9be898214e953ebf7ed9492a372d0e"><strong>Severity:</strong><span> Medium</span></li><li data-list-item-id="ef82111015c6414359d7ad3cf945f7b95"><strong>Suggested CVSS:</strong><span>&nbsp;</span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L" target="_blank" rel="noreferrer"><span>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L</span></a></li><li data-list-item-id="e0184103c9e75f3a9d82c742f1713563e"><strong>References:</strong><span>&nbsp;</span><a href="https://www.cve.org/CVERecord?id=CVE-2025-59020" target="_blank" rel="noreferrer"><span>CVE-2025-59020</span></a><span>,&nbsp;</span><a href="https://cwe.mitre.org/data/definitions/863.html" target="_blank" rel="noreferrer"><span>CWE-863</span></a></li></ul><hr>
<h3>Problem Description</h3>
<p>By exploiting the <i>defVals</i> parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Daniel Windloff for reporting this issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2911</guid>
                    <pubDate>
                        Wed, 17 Dec 2025 10:00:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-016: Vulnerability in bundled package in extension &quot;Single Sign-on with SAML&quot; (md_saml)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-016
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Single Sign-on with SAML&quot; (md_saml) bundles a vulnerable version of “onelogin/php-saml“ which is susceptible to Authentication Bypass.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li data-list-item-id="e3309c81c1c20d055b44f723ed89dbf3d">Release Date: <span>December 17, 2025</span></li><li data-list-item-id="ed103b786124e0ccbf3f27dd90b7867e4">Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li data-list-item-id="ed62a79e1af0380b0c1809a95a6fe4540">Component: <a href="https://extensions.typo3.org/extension/md_saml" target="_blank" rel="noreferrer"><span>"Single Sign-on with SAML" (md_saml)</span></a></li><li data-list-item-id="eff75dec0df436b856751802274c2ffce">Composer Package Name: <a href="https://packagist.org/packages/mediadreams/md_saml" target="_blank" rel="noreferrer"><span>mediadreams/md_saml</span></a></li><li data-list-item-id="e948f27fb159f551d4cc401fbe0d7102b">Vulnerability Type: <span>Authentication Bypass</span></li><li data-list-item-id="e815c0e117ca0618cc6757993481092ed">Affected Versions: <span>3.0.7 and below, 4.0.0 - 4.0.4</span></li><li data-list-item-id="e8042a3c696b178387eca8f2a0a7483af">Severity: Critical</li><li data-list-item-id="ec7513ca012eed99fbcc0d4b651d7601a">Suggested <span>CVSS v4.0:</span> <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><span>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span></a></li><li data-list-item-id="ed715eeef4066315254f1ffbf65c7cef4">References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-66475" target="_blank" rel="noreferrer"><span>CVE-2025-66475</span></a><span>, </span><a href="https://cwe.mitre.org/data/definitions/1395.html" target="_blank" rel="noreferrer"><span>CWE-1395</span></a></li></ul><h3>Problem Description</h3>
<p>The extension bundles the PHP package “onelogin/php-saml”, which is affected by a&nbsp;<a href="https://github.com/advisories/GHSA-5j8p-438x-rgg5" target="_blank" rel="noreferrer">Authentication Bypass vulnerability</a> via a Signature Validation Bypass vulnerability in “robrichards/xmlseclibs”.</p>
<h3>Solution</h3>
<p>Updated versions 3.0.8 and 4.0.5 are available from the TYPO3 extension manager, packagist and at</p>
<p><a href="https://extensions.typo3.org/extension/download/md_saml/3.0.8/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/md_saml/3.0.8/zip</a><br><a href="https://extensions.typo3.org/extension/download/md_saml/4.0.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/md_saml/4.0.5/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Christoph Daecke&nbsp; for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2908</guid>
                    <pubDate>
                        Wed, 12 Nov 2025 11:31:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-015: Broken Authentication in extension &quot;Modules&quot; (modules)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-015
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Modules&quot; (modules) is susceptible to Broken Authentication.
</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: November 12, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/modules" target="_blank" rel="noreferrer"><u>“Modules” (modules)</u></a></li><li>Composer Package Name: codingms/modules</li><li>Vulnerability Type: Broken Authentication</li><li>Affected Versions: 4.3.10 and below, 5.0.0 - 5.7.3, 6.0.0 - 6.4.1, 7.0.0 - 7.5.4</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-12998" target="_blank" rel="noreferrer"><u>CVE-2025-12998</u></a>, <a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><u>CWE-862</u></a></li></ul><h3>Problem Description</h3>
<p>The extension provides a feature to login as a frontend user for authenticated backend users by calling a special URL. The implemented access check can however be bypassed, if the extension setting <i>“module.frontendUser.allowNonAdminUsersToLoginAsFrontendUser”</i> is enabled, resulting in an unauthenticated remote user to login as any frontend user.</p>
<h3>Solution</h3>
<p>Updated versions 4.3.11, 5.7.4, 6.4.2 and 7.5.5 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/modules/4.3.11/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/4.3.11/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/5.7.4/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/5.7.4/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/6.4.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/6.4.2/zip</a>&nbsp;<br><a href="https://extensions.typo3.org/extension/download/modules/7.5.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/modules/7.5.5/zip</a>&nbsp;</p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Thomas Deuling for reporting the vulnerability and &nbsp;for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2907</guid>
                    <pubDate>
                        Wed, 12 Nov 2025 11:30:00 +0100
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-014: Vulnerability in bundled package in extension &quot;Forms Export&quot; (frp_form_answers)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-014
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Forms Export&quot; (frp_form_answers) bundles a vulnerable version of &quot;phpoffice/phpspreadsheet&quot;, which is susceptible to Server-Side Request Forgery.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: November 12, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/frp_form_answers" target="_blank" rel="noreferrer"><u>“Forms Export” (frp_form_answers)</u></a></li><li>Composer Package Name: frappant/frp-form-answers</li><li>Vulnerability Type: Server-Side Request Forgery</li><li>Affected Versions: 5.0.3 and below, 6.0.0 - 6.1.1</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-54370" target="_blank" rel="noreferrer"><u>CVE-2025-54370</u></a>, <a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer"><u>CWE-918</u></a></li></ul><h3>Problem Description</h3>
<p>The TER extension bundles the PHP package “<a href="https://packagist.org/packages/phpoffice/phpspreadsheet" target="_blank" rel="noreferrer">phpoffice/phpspreadsheet</a>”, which is affected by a Server-Side Request Forgery vulnerability.</p>
<p class="alert alert-warning"><strong>Note:</strong> The extension does <strong>not</strong> bundle the PHP package “phpoffice/phpspreadsheet” anymore. The Excel Export feature does only work, when the extension is installed via composer.</p>
<h3>Solution</h3>
<p>Updated versions 5.0.4 and 6.1.2 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/frp_form_answers/5.0.4/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/frp_form_answers/5.0.4/zip</u></a><br><a href="https://extensions.typo3.org/extension/download/frp_form_answers/6.1.2/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/frp_form_answers/6.1.2/zip</u></a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Mikel Wohlschlegel for reporting the vulnerability and to Jonas Hirschi for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2877</guid>
                    <pubDate>
                        Tue, 16 Sep 2025 10:31:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-013: Vulnerability in bundled package in extension &quot;Base Excel&quot; (base_excel)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-013
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Base Excel&quot; (base_excel) bundles a vulnerable version of “phpoffice/phpspreadsheet“ which is susceptible to Server-Side Request Forgery.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: September 16, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/base_excel" target="_blank" rel="noreferrer"><u>"Base Excel" (base_excel)</u></a></li><li>Composer Package Name: jambagecom/base-excel</li><li>Vulnerability Type: Server-Side Request Forgery</li><li>Affected Versions: 4.5.0 and below</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-54370" target="_blank" rel="noreferrer"><u>CVE-2025-54370</u></a>, <a href="https://cwe.mitre.org/data/definitions/918.html" target="_blank" rel="noreferrer"><u>CWE-918</u></a></li></ul><h3>Problem Description</h3>
<p>The TER extension bundles the PHP package “<a href="https://packagist.org/packages/phpoffice/phpspreadsheet" target="_blank" rel="noreferrer">phpoffice/phpspreadsheet</a>”, which is affected by a Server-Side Request Forgery vulnerability.</p>
<h3>Solution</h3>
<p>An updated version 5.1.0 is available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/base_excel/5.1.0/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/base_excel/5.1.0/zip</u></a><br><br>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Franz Holzinger &nbsp;for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2876</guid>
                    <pubDate>
                        Tue, 16 Sep 2025 10:30:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-012: Cross-Site Scripting in extension &quot;Form to Database&quot; (form_to_database)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-012
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Form to Database&quot; (form_to_database) is susceptible to Cross-Site Scripting.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: September 16, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/form_to_database" target="_blank" rel="noreferrer"><u>"Form to Database" (form_to_database)</u></a></li><li>Composer Package Name: lavitto/typo3-form-to-database</li><li>Vulnerability Type: Cross-Site Scripting</li><li>Affected Versions: 2.2.4 and below, 3.0.0 - 3.2.1, 4.0.0 - 4.2.2, 5.0.0 - 5.0.1</li><li>Severity: Low</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-10316" target="_blank" rel="noreferrer"><u>CVE-2025-10316</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer"><u>CWE-79</u></a></li></ul><h3>Problem Description</h3>
<p>The extension fails to properly encode user input for output in HTML context in TYPO3 backend user interface.</p>
<h3>Solution</h3>
<p>Updated versions 2.2.5, 3.2.2, 4.2.3 and 5.0.2 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/form_to_database/2.2.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/2.2.5/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/3.2.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/3.2.2/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/4.2.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/4.2.3/zip</a> &nbsp;<br><a href="https://extensions.typo3.org/extension/download/form_to_database/5.0.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/form_to_database/5.0.2/zip</a> &nbsp; &nbsp;</p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Sascha Egerer for reporting the vulnerability and to Liquid Light for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2873</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:07:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-023: Information Disclosure via CSV Download</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-023
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> List Module (ext:backend, ext:recordlist)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59019" target="_blank" rel="noreferrer"><u>CVE-2025-59019</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><u>CWE-200</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>The CSV download feature in the backend user interface allowed callers to request arbitrary data from the database without performing a permission check on the target table. Consequently, a backend user without rights to a particular database table could retrieve records, leading to information disclosure. This vulnerability was limited to database records that fell within the page tree the user was already permitted to access.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security team member Oliver Hader for reporting the issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2872</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:06:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-022: Information Disclosure in Workspaces Module</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-022
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Workspaces Module (ext:workspaces)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> High</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59018" target="_blank" rel="noreferrer"><u>CVE-2025-59018</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noreferrer"><u>CWE-200</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>In addition to the vulnerability documented in TYPO3‑CORE‑SA‑2025‑021 (CVE‑2025‑59017), any authenticated backend user could invoke a backend AJAX route belonging to the workspaces module.</p>
<p>The route allowed the caller to request arbitrary data from the database, without performing a permission check on the target table. Consequently, a backend user without rights to a particular database table could retrieve sensitive records, leading to information disclosure.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security team member Oliver Hader for reporting and fixing this issue.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2871</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:05:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-021: Broken Access Control in Backend AJAX Routes</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-021
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to broken access control.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Backend Routing (ext:backend)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Broken Access Control</li><li><strong>Affected Versions:</strong>9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59017" target="_blank" rel="noreferrer"><u>CVE-2025-59017</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/862.html" target="_blank" rel="noreferrer"><u>CWE-862</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Dedicated AJAX routes used by TYPO3 backend modules were not protected by the same permission checks that guard the modules themselves. As a result, an authenticated backend user could directly call these routes - even if the user had no permissions to the corresponding module.<br>This allowed users to read, modify, or delete data directly - effectively bypassing module‑level restrictions.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<p>The AJAX route property <a href="https://docs.typo3.org/permalink/changelog:important-106983-1750962567@main" target="_blank" rel="noreferrer"><i><u>inheritAccessFromModule</u></i></a> is introduced. When this property is set, a route is explicitly bound to the permissions of a specified backend module.</p>
<p>In general, developers are advised to always verify authorization on target resources (pages, database tables, files, etc.) within the corresponding AJAX handler or controller. More details are available at <a href="https://docs.typo3.org/permalink/t3coreapi:be-user-check" target="_blank" rel="noreferrer"><u>https://docs.typo3.org/permalink/t3coreapi:be-user-check</u></a>.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 security team member Elias Häußler for reporting and fixing this issue.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2870</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:04:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-020: Information Disclosure via File Abstraction Layer</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-020
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to information disclosure.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> File Abstraction Layer (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Information Disclosure</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59016" target="_blank" rel="noreferrer"><u>CVE-2025-59016</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/209.html" target="_blank" rel="noreferrer"><u>CWE-209</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>When specific low‑level file‑system operations fail during execution through the File Abstraction Layer, the full path of the affected resource is disclosed. Exploiting this vulnerability requires a valid backend user account.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Dmitry Petschke and Marc Willmann for reporting this issue, and to TYPO3 core team member Andreas Kienast for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2869</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:03:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-019: Insufficient Entropy in Password Generation</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-019
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to insufficient entropy.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Crypto (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Insufficient Entropy</li><li><strong>Affected Versions:&nbsp;</strong>12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59015" target="_blank" rel="noreferrer"><u>CVE-2025-59015</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/331.html" target="_blank" rel="noreferrer"><u>CWE-331</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>By default, the Password Generation component creates a password that always begins with a deterministic three‑character prefix (<i>lower‑case, upper‑case, digit</i>). Consequently, the effective entropy of the generated passwords is lower than expected. Invocations that employ the <i>random</i> password rules are unaffected.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Mathias Brodala for reporting this issue, and to TYPO3 core &amp; security team member Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2868</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:02:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-018: Denial of Service in TYPO3 Bookmark Toolbar</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-018
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to denial of service.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Bookmark Toolbar (ext:backend)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Denial of Service</li><li><strong>Affected Versions:</strong> 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59014" target="_blank" rel="noreferrer"><u>CVE-2025-59014</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/248.html" target="_blank" rel="noreferrer"><u>CWE-248</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Due to insufficient input validation, manipulated data saved in the bookmark toolbar of the backend user interface causes a general error state, blocking further access to the interface. Exploiting this vulnerability requires an administrator-level backend user account.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to Jakub Świes for reporting this issue, and to TYPO3 core &amp; security team member Oliver Hader for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2867</guid>
                    <pubDate>
                        Tue, 09 Sep 2025 11:01:00 +0200
                    </pubDate>
                    <title>TYPO3-CORE-SA-2025-017: Open Redirect in TYPO3 CMS</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-core-sa-2025-017
                        
                    </link>
                    <description>It has been discovered that TYPO3 CMS is susceptible to open redirect.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> Core Utilities (ext:core)</li><li><strong>Release Date:</strong> September 9, 2025</li><li><strong>Vulnerability Type:</strong> Open Redirect</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS:</strong>&nbsp;<a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</u></a></li><li><strong>References:</strong>&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-59013" target="_blank" rel="noreferrer"><u>CVE-2025-59013</u></a>,&nbsp;<a href="https://cwe.mitre.org/data/definitions/601.html" target="_blank" rel="noreferrer"><u>CWE-601</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>Applications that use <i>TYPO3\CMS\Core\Utility\GeneralUtility::sanitizeLocalUrl</i> to allow only local URLs are vulnerable to open redirect attacks if the URL is used after it has passed the aforementioned sanitization checks. This enables attackers to redirect users to external content and carry out phishing attacks.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.55 ELTS, 10.4.54 ELTS, 11.5.48 ELTS, 12.4.37 LTS, 13.4.18 LTS that fix the problem described.</p>
<h3>Credits</h3>
<p>Thanks to TYPO3 core &amp; security&nbsp; team member Oliver Hader for reporting this issue, and to TYPO3 core &amp; security team member Benjamin Franzke for fixing it.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
<h3>General Note</h3>
<p>All security-related code changes are tagged so you can easily look them up in our <a href="https://review.typo3.org/#/q/status:merged+project:Packages/TYPO3.CMS+topic:security,n,z" target="_blank" rel="noreferrer">review system</a>.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2864</guid>
                    <pubDate>
                        Tue, 02 Sep 2025 10:30:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-011: Command Injection in extension &quot;TYPO3 Backup Plus&quot; (ns_backup)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-011
                        
                    </link>
                    <description>It has been discovered that the extension &quot;TYPO3 Backup Plus&quot; (ns_backup) is susceptible to Command Injection.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: September 2, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/ns_backup" target="_blank" rel="noreferrer">"TYPO3 Backup Plus" (ns_backup)</a></li><li>Composer Package Name: nitsan/ns-backup</li><li>Vulnerability Type: Command Injection</li><li>Affected Versions: 13.0.2 and below</li><li>Severity: High</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-9573" target="_blank" rel="noreferrer">CVE-2025-9573</a>, <a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer">CWE-77</a></li></ul><h3>Problem Description</h3>
<p>The extension fails to sanitize user input resulting in Command Injection when creating a backup. Exploiting this vulnerability requires a valid administrator account.</p>
<h3>Solution</h3>
<p>An updated version 13.0.3 is available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/ns_backup/13.0.3/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ns_backup/13.0.3/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to the Swiss NCSC Vulnerability Management Team for reporting the vulnerability and to NITSAN for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2850</guid>
                    <pubDate>
                        Thu, 14 Aug 2025 10:00:00 +0200
                    </pubDate>
                    <title>TYPO3-PSA-2025-001: Sanitization bypass in SVG Sanitizer</title>
                    <author>
                        
                                Oliver Hader
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-psa-2025-001
                        
                    </link>
                    <description>Third-party package enshrined/svg-sanitize, used by TYPO3 core packages, was susceptible to bypassing the sanitization strategy.</description>
                    <content:encoded>
                        <![CDATA[
                            <hr><ul class="list-normal"><li><strong>Type:</strong> Advisory</li><li><strong>Component Type:</strong> TYPO3 CMS</li><li><strong>Subcomponent:</strong> SVG Sanitizer (based on <a href="https://packagist.org/packages/enshrined/svg-sanitize" target="_blank" rel="noreferrer"><u>enshrined/svg-sanitize</u></a>)</li><li><strong>Release Date:</strong> August 14, 2025</li><li><strong>Impact:</strong> Link Injection, in some cases Cross-Site Scripting</li><li><strong>Affected Versions:</strong> 9.0.0-9.5.53, 10.0.0-10.4.52, 11.0.0-11.5.46, 12.0.0-12.4.35, 13.0.0-13.4.16</li><li><strong>Severity:</strong> Medium</li><li><strong>Suggested CVSS: </strong><a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</u></a></li><li><strong>References: </strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55166" target="_blank" rel="noreferrer"><u>CVE-2025-55166</u></a></li></ul><hr>
<h3>Problem Description</h3>
<p>The <i>enshrined/svg-sanitize</i> library (versions before 0.22.0) did not properly sanitize resource references in mixed-case attributes (<i>HrEf="..."</i> or <i>xlink:HrEf="..."</i>) in SVG content. This flaw could allow an attacker to inject links to external sites and execute JavaScript if no Content-Security-Policy (CSP) headers were in place. Only inline SVG content embedded directly in HTML was affected.</p>
<p>For more details, see the <a href="https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-22wq-q86m-83fh" target="_blank" rel="noreferrer"><u>official advisory for the library</u></a>.</p>
<h3>Solution</h3>
<p>Update to TYPO3 versions 9.5.54 ELTS, 10.4.53 ELTS, 11.5.47 ELTS, 12.4.36 LTS, 13.4.17 LTS that fix the problem described by including version 0.22.0 of the <i>enshrined/svg-sanitize</i> library.</p>
<p><strong>Note:</strong> Due to the previous TYPO3 dependency constraint (<i>"^0.20.0"</i>), installing <i>enshrined/svg-sanitize</i> version <i>0.22.0</i> directly was not possible. The updated TYPO3 releases now require <i>"~0.22"</i>, ensuring that the fixed library version and future updates are included automatically.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce</a> mailing list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                            <category>TYPO3 CMS</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2839</guid>
                    <pubDate>
                        Tue, 22 Jul 2025 11:04:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-010: Insecure Direct Object Reference in extension &quot;femanager&quot; (femanager)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-010
                        
                    </link>
                    <description>It has been discovered that the extension &quot;femanager&quot; (femanager) is susceptible to Insecure Direct Object Reference.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: July 22, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/femanager" target="_blank" rel="noreferrer"><u>femanager (femanager)</u></a></li><li>Composer Package Name: in2code/femanager</li><li>Vulnerability Type: Insecure Direct Object Reference</li><li>Affected Versions: 6.4.1 and below, 7.0.0 - 7.5.2, 8.0.0 - 8.3.0</li><li>Severity: Medium</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-7900" target="_blank" rel="noreferrer">CVE-2025-7900</a>, <a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer">CWE-639</a></li></ul><h3>Problem Description</h3>
<p>The affected TYPO3 extension attempts to validate the integrity of the <i>__identity</i> parameter when saving user-submitted data. If a modification of the <i>__identity</i> value is detected, the extension logs the incident using Extbase persistence mechanisms.</p>
<p>However, due to improper handling of the manipulated user object (mapped by Extbase based on the modified <i>__identity</i> parameter) the logging operation unintentionally persists changes to the user object. This allows authenticated frontend users with access to the "Edit" plugin to arbitrarily modify other frontend user records by submitting manipulated data.</p>
<h3>Solution</h3>
<p>Updated versions 6.4.2, 7.5.3 and 8.3.1 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/femanager/8.3.1/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/femanager/8.3.1/zip</u></a><br><a href="https://extensions.typo3.org/extension/download/femanager/7.5.3/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/femanager/7.5.3/zip</u></a><br><a href="https://extensions.typo3.org/extension/download/femanager/6.4.2/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/femanager/6.4.2/zip</u></a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Alexander Freundlieb for reporting the vulnerability and to Stefan Busemann for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2838</guid>
                    <pubDate>
                        Tue, 22 Jul 2025 11:02:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-009: Insecure Direct Object Reference in extension &quot;powermail&quot; (powermail)</title>
                    <author>
                        
                                Torben Hansen
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-009
                        
                    </link>
                    <description>It has been discovered that the extension &quot;powermail&quot; (powermail) is susceptible to Insecure Direct Object Reference.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: July 22, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/powermail" target="_blank" rel="noreferrer"><u>"powermail" (powermail)</u></a></li><li>Composer Package Name: in2code/powermail</li><li>Vulnerability Type: Insecure Direct Object Reference</li><li>Affected Versions: 12.0.0 - 12.5.2, 13.0.0</li><li>Severity: Medium</li><li>Suggested CVSS v4.0: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" target="_blank" rel="noreferrer"><u>AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</u></a></li><li>References: <a href="https://www.cve.org/CVERecord?id=CVE-2025-7899" target="_blank" rel="noreferrer">CVE-2025-7899</a>, <a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer">CWE-639</a></li></ul><h3>Problem Description</h3>
<p>The extension fails to validate the query parameter “file” of the “downloadFile” function in the backend module of the extension resulting in Insecure Direct Object Reference (IDOR). An authenticated attacker with access to the backend module can use this vulnerability to download arbitrary files the webserver has access to. In order to successfully exploit the vulnerability, it is required that at least one powermail email record containing an uploaded file is available in the backend module.</p>
<h3>Solution</h3>
<p>Updated versions 12.5.3 and 13.0.1 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/powermail/12.5.3/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/powermail/12.5.3/zip</u></a><br><a href="https://extensions.typo3.org/extension/download/powermail/13.0.1/zip" target="_blank" rel="noreferrer"><u>https://extensions.typo3.org/extension/download/powermail/13.0.1/zip</u></a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Riny van Tiggelen for reporting the vulnerability and to Marcus Schwemer for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2793</guid>
                    <pubDate>
                        Tue, 20 May 2025 12:04:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-008: Multiple vulnerabilities in extension &quot;Front End User Registration&quot; (sr_feuser_register)</title>
                    <author>
                        
                                Elias Häußler
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-008
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Front End User Registration&quot; (sr_feuser_register) is susceptible to Remote Code Execution and Insecure Direct Object Reference.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: May 20, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/sr_feuser_register" target="_blank" rel="noreferrer">"Front End User Registration" (sr_feuser_register)</a></li><li>Composer Package Name: sjbr/sr-feuser-register</li><li>Vulnerability Type: Remote Code Execution and Insecure Direct Object Reference</li><li>Affected Versions: 5.1.0 – 12.4.8</li><li>Severity: Critical</li><li>Suggested CVSS v3.1: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&amp;version=3.1" target="_blank" rel="noreferrer">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</a></li><li>References: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48200" target="_blank" rel="noreferrer">CVE-2025-48200</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48205" target="_blank" rel="noreferrer">CVE-2025-48205</a>, <a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noreferrer">CWE-502</a>, <a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer">CWE-639</a></li></ul><h3>Problem Description</h3>
<p>The extension allows the exchange of a serialized file object representation of a previously uploaded file without proper validation. This enables an attacker to inject arbitrary serialized PHP objects, which may be deserialized on the server side, potentially leading to Remote Code Execution (RCE).</p>
<p>The extension does not verify if a specified file identifier is authorized for download. This allows an attacker to disclose and download arbitrary files without further authentication, resulting in an Insecure Direct Object Reference (IDOR) vulnerability.</p>
<h3>Solution</h3>
<p>An updated version 12.5.0 is available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/sr_feuser_register/12.5.0/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/sr_feuser_register/12.5.0/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Johannes Seipelt for reporting the RCE vulnerability, to Security Team Member Torben Hansen for reporting the IDOR issue, and to Stanislas Roland for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2792</guid>
                    <pubDate>
                        Tue, 20 May 2025 12:03:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-007: Multiple vulnerabilities in extension &quot;Backup Plus&quot; (ns_backup)</title>
                    <author>
                        
                                Elias Häußler
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-007
                        
                    </link>
                    <description>It has been discovered that the extension &quot;Backup Plus&quot; (ns_backup) is susceptible to Command Injection, Predictable Resource Location and Cross-Site Scripting.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: May 20, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/ns_backup" target="_blank" rel="noreferrer">"Backup Plus" (ns_backup)</a></li><li>Composer Package Name: nitsan/ns-backup</li><li>Vulnerability Type: Command Injection, Predictable Resource Location and Cross-Site Scripting</li><li>Affected Versions: 13.0.0 and below</li><li>Severity: Medium</li><li>Suggested CVSS v3.1: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C&amp;version=3.1" target="_blank" rel="noreferrer">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C</a></li><li>References: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48201" target="_blank" rel="noreferrer">CVE-2025-48201</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48204" target="_blank" rel="noreferrer">CVE-2025-48204</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48206" target="_blank" rel="noreferrer">CVE-2025-48206</a>, <a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank" rel="noreferrer">CWE-77</a>, <a href="https://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noreferrer">CWE-79</a>, <a href="https://cwe.mitre.org/data/definitions/552.html" target="_blank" rel="noreferrer">CWE-552</a></li></ul><h3>Problem Description</h3>
<p>The extension fails to sanitize user input resulting in Command Injection when creating a backup. An authenticated backend user with access to the extensions backend module is required to exploit the vulnerability.</p>
<p>The extension saves backup and configuration files to a predictable resource location. This allows an unauthenticated remote user to download created backups and configuration files.</p>
<p>The extension fails to properly encode user input for output in HTML context in TYPO3 backend user interface.</p>
<p class="alert alert-info">Note: The TYPO3 Security Team recommends downloading and removing all previously created backup files to delete any files that may be affected by the Predictable Resource Location vulnerability. Additionally, it is recommended to configure a non-public accessible directory as target folder for backups.</p>
<h3>Solution</h3>
<p>An updated version 13.0.1 is available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/ns_backup/13.0.1/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/ns_backup/13.0.1/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Jakub Świes and to Swiss NCSC Vulnerability Management Team for reporting the Command Injection vulnerability, Swiss NCSC Vulnerability Management Team and TYPO3 Security Team Member Torben Hansen for reporting the Predictable Resource Location vulnerability, Swiss NCSC Vulnerability Management Team for reporting the Cross-Site Scripting vulnerabilities and Sanjay Chauhan (NITSAN) for providing an updated version of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
                <item>
                    <guid isPermaLink="false">news-2791</guid>
                    <pubDate>
                        Tue, 20 May 2025 12:02:00 +0200
                    </pubDate>
                    <title>TYPO3-EXT-SA-2025-006: Insecure Direct Object Reference in extension &quot;femanager&quot; (femanager)</title>
                    <author>
                        
                                Elias Häußler
                            
                    </author>
                    <link>
                        
                            https://typo3.org/security/advisory/typo3-ext-sa-2025-006
                        
                    </link>
                    <description>It has been discovered that the extension &quot;femanager&quot; (femanager) is susceptible to Insecure Direct Object Reference.</description>
                    <content:encoded>
                        <![CDATA[
                            <ul class="list-normal"><li>Release Date: May 20, 2025</li><li>Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.</li><li>Component: <a href="https://extensions.typo3.org/extension/femanager" target="_blank" rel="noreferrer">"femanager" (femanager)</a></li><li>Composer Package Name: in2code/femanager</li><li>Vulnerability Type: Insecure Direct Object Reference</li><li>Affected Versions: 5.5.0 - 5.5.4, 6.0.0 - 6.4.0, 7.0.0 - 7.4.1, 8.0.0 - 8.2.1</li><li>Severity: Medium</li><li>Suggested CVSS v3.1: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C&amp;version=3.1" target="_blank" rel="noreferrer">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C</a></li><li>References: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48202" target="_blank" rel="noreferrer">CVE-2025-48202</a>, <a href="https://cwe.mitre.org/data/definitions/639.html" target="_blank" rel="noreferrer">CWE-639</a>, <a href="https://cwe.mitre.org/data/definitions/284.html" target="_blank" rel="noreferrer">CWE-284</a></li></ul><h3>Problem Description</h3>
<p>A superfluous parameter in the <i>newAction</i> of the <i>newController</i> allows an unauthenticated user to view user data of any frontend user.</p>
<h3>Solution</h3>
<p>Updated versions 5.5.5, 6.4.1, 7.4.2 and 8.2.2 are available from the TYPO3 extension manager, packagist and at<br><a href="https://extensions.typo3.org/extension/download/femanager/5.5.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/femanager/5.5.5/zip</a><br><a href="https://extensions.typo3.org/extension/download/femanager/5.5.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/femanager/6.4.1/zip</a><br><a href="https://extensions.typo3.org/extension/download/femanager/5.5.5/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/femanager/7.4.2/zip</a><br><a href="https://extensions.typo3.org/extension/download/femanager/8.2.2/zip" target="_blank" rel="noreferrer">https://extensions.typo3.org/extension/download/femanager/8.2.2/zip</a></p>
<p>Users of the extension are advised to update the extension as soon as possible.</p>
<h3>Credits</h3>
<p>Thanks to Stefan Busemann for providing updated versions of the extension.</p>
<h3>General Advice</h3>
<p>Follow the recommendations that are given in the <a href="https://docs.typo3.org/typo3cms/CoreApiReference/Security/Index.html#security" target="_blank" rel="noreferrer">TYPO3 Security Guide</a>. Please subscribe to the <a href="http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-announce" target="_blank" rel="noreferrer">typo3-announce mailing</a> list.</p>
                        ]]>
                    </content:encoded>
                    
                        
                            <category>Development</category>
                        
                    
                </item>
            
        
    </channel>
</rss>
