Component Type: Third party extension. This extension is not part of the TYPO3 default installation.
Affected Versions: Version 4.0.3 and below
Vulnerability Type: Cross Site Scripting, Remote Code Execution
Severity: HIGH
Problem Description: Failing to filter user input the extension is susceptible to Cross Site Scripting (XSS) making it possible to execute arbitrary JavaScript. When using upload forms with this extension, it is possible to execute arbitrary PHP script code due to insufficient file filtering.
Solution: An updated version is available from the TYPO3 extension manager and at typo3.org/extensions/repository/view/th_mailformplus/4.0.4/.
At the time of writing, the most recent version of MailformPlus is version 4.0.7 which is available at typo3.org/extensions/repository/view/th_mailformplus/4.0.7/.
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to security team member Marcus Krause, who discovered the issue. Furthermore the TYPO3 Security Team wishes to thank the guys at Typoheads GmbH. After being informed by the TYPO3 Security Team about the presence of security issues, they have fixed the issues quickly.