Skip to main navigation Skip to main content Skip to page footer

TYPO3-EXT-SA-2026-010: SQL Injection in extension "News system" (news)

Categories: Development Created by Torben Hansen

It has been discovered that the extension "News system" (news) is vulnerable to SQL Injection.

Problem Description

The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the "Date Menu of news articles" plugin.

Exploitation requires the "Date Menu of news articles" plugin to be in use and the TypoScript/Plugin setting disableOverrideDemand not to be enabled.

Solution

Updated versions 14.0.3, 13.0.2, 12.3.2 and 11.4.4 are available from the TYPO3 extension manager, packagist and at

https://extensions.typo3.org/extension/download/news/14.0.3/zip
https://extensions.typo3.org/extension/download/news/13.0.2/zip
https://extensions.typo3.org/extension/download/news/12.3.2/zip
https://extensions.typo3.org/extension/download/news/11.4.4/zip

Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to TYPO3 Core Team member Christian Kuhn for reporting the vulnerability and to TYPO3 Core and Security Team member Georg Ringer for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.