Skip to main navigation Skip to main content Skip to page footer

TYPO3-EXT-SA-2026-008: Remote Code Execution in extension "Site Crawler" (crawler)

Categories: Development Created by Torben Hansen

It has been discovered that the extension "Site Crawler" (crawler) is vulnerable to Remote Code Execution.

Problem Description

The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP objects, leading to Remote Code Execution on the TYPO3 server.

Exploitation requires administrative privileges to configure a crawler-enabled page and trigger the crawl via a Scheduler task, but can be abused by non-super-admin administrators to escalate privileges.

Solution

Updated versions 12.0.11 and 11.0.13 are available from the TYPO3 extension manager, packagist and at

https://extensions.typo3.org/extension/download/crawler/12.0.11/zip
https://extensions.typo3.org/extension/download/crawler/11.0.13/zip

Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Roman Hergenreder for reporting the vulnerability and to Tomas Norre Mikkelsen for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.