Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: Version 1.7.0 and all versions below
Vulnerability Type: Cross Site Scripting, SQL injection
Severity: HIGH
Problem Description: Failing to filter user input the extension is susceptible to multiple ways of Cross Site Scripting (XSS) making it possible to execute arbitrary JavaScript. In addition, failing to properly sanitize user-supplied input the extension is open to SQL Injections.
Solution: An updated version 1.7.1 is available from the TYPO3 extension manager and at http://typo3.org/extensions/repository/view/wec_discussion/1.7.1/. Users of the extension are advised to update the extension as soon as possible.
General advice: Follow the recommendations that are given in the TYPO3 SECURITY Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Credits: Credits go to Peter Athmann and TYPO3 Security Team member Rove Monteux who discovered and reported the issues.