TYPO3-EXT-SA-2025-002: Cross-Site Scripting in extension “Additional TCA” (additional_tca)

Categories: Development Created by Torben Hansen
It has been discovered that the extension “Additional TCA” (additional_tca) is susceptible to Cross-Site Scripting.

Problem Description

The extension fails to properly encode user input for output in HTML context in TYPO3 backend user interface. Note, that the vulnerability can only be exploited by a logged in backend user.

Solution

Updated versions 1.15.17 and 1.16.9 are available from the TYPO3 extension manager, packagist and at  
https://extensions.typo3.org/extension/download/additional_tca/1.15.17/zip
https://extensions.typo3.org/extension/download/additional_tca/1.16.9/zip

Users of the extension are advised to update the extension as soon as possible.

Additionally, the TYPO3 Security Team recommends enabling the Content Security Policy (CSP) for the TYPO3 backend user interface in TYPO3 12.4. In TYPO3 13.4, this security feature is enabled by default.

Credits

Thanks to the Swiss NCSC Vulnerability Management Team for reporting the issue and to Thomas Deuling for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.