TYPO3-CORE-SA-2015-012: Cross-Site Scripting vulnerability in typolinks

December 15, 2015

Category: TYPO3 CMS
Author: Nicole Cordes
Keywords: TYPO3 CMS, Cross-Site Scripting

It has been discovered, that TYPO3 is susceptible to Cross-Site Scripting

Component Type: TYPO3 CMS

Release Date: December 15, 2015


Vulnerability Type: Cross-Site Scripting

Affected Versions: Versions 6.2.0 to 6.2.15, 7.0.0 to 7.6.0

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: All link fields within the TYPO3 installation are vulnerable to Cross-Site Scripting as authorized editors can insert javascript commands by using the url scheme "javascript:".

Solution: Update to TYPO3 versions 6.2.16 or 7.6.1 that fix the problem described. By default now the typoLink() function disables the insecure url scheme "javascript:".

Important note: If your TYPO3 installation is in need of that prefix you can re-enable the old behaviour by installing the extension javascript_handler.

Credits: Thanks to Oliver Hader who discovered and reported the issues.


General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.