CVE-2024-34356
- EPSS 0.63%
- Veröffentlicht 14.05.2024 16:17:24
- Zuletzt bearbeitet 03.09.2025 17:34:28
TYPO3 is an enterprise content management system. Starting in version 9.0.0 and prior to versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, and 13.1.1, the form manager backend module is vulnerable to cross-site scripting. Exploiting this ...
CVE-2024-22188
- EPSS 0.69%
- Veröffentlicht 05.03.2024 02:15:27
- Zuletzt bearbeitet 15.09.2025 17:21:54
TYPO3 before 13.0.1 allows an authenticated admin user (with system maintainer privileges) to execute arbitrary shell commands (with the privileges of the web server) via a command injection vulnerability in form fields of the Install Tool. The fixed...
CVE-2024-25121
- EPSS 0.23%
- Veröffentlicht 13.02.2024 23:15:09
- Zuletzt bearbeitet 21.11.2024 09:00:17
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions of TYPO3 entities of the File Abstraction Layer (FAL) could be persisted directly via `DataHandler`. This allowed attackers to reference ...
CVE-2024-25118
- EPSS 0.39%
- Veröffentlicht 13.02.2024 23:15:08
- Zuletzt bearbeitet 21.11.2024 09:00:17
TYPO3 is an open source PHP based web content management system released under the GNU GPL. Password hashes were being reflected in the editing forms of the TYPO3 backend user interface. This allowed attackers to crack the plaintext password using br...
CVE-2024-25119
- EPSS 0.22%
- Veröffentlicht 13.02.2024 23:15:08
- Zuletzt bearbeitet 21.11.2024 09:00:17
TYPO3 is an open source PHP based web content management system released under the GNU GPL. The plaintext value of `$GLOBALS['SYS']['encryptionKey']` was displayed in the editing forms of the TYPO3 Install Tool user interface. This allowed attackers ...
CVE-2024-25120
- EPSS 0.19%
- Veröffentlicht 13.02.2024 23:15:08
- Zuletzt bearbeitet 21.11.2024 09:00:17
TYPO3 is an open source PHP based web content management system released under the GNU GPL. The TYPO3-specific `t3://` URI scheme could be used to access resources outside of the users' permission scope. This encompassed files, folders, pages, and re...
CVE-2023-30451
- EPSS 0.26%
- Veröffentlicht 25.12.2023 05:15:08
- Zuletzt bearbeitet 21.11.2024 08:00:12
In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST /typo3/record/edit with ../../../ in data[sys_file_st...
CVE-2023-47126
- EPSS 0.21%
- Veröffentlicht 14.11.2023 20:15:08
- Zuletzt bearbeitet 21.11.2024 08:29:49
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient...
CVE-2023-47127
- EPSS 0.18%
- Veröffentlicht 14.11.2023 20:15:08
- Zuletzt bearbeitet 21.11.2024 08:29:50
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In typo3 installations there are always at least two different sites. Eg. first.example.org and second.example.com. In affected versions a session cookie gene...
CVE-2023-47125
- EPSS 0.34%
- Veröffentlicht 14.11.2023 20:15:07
- Zuletzt bearbeitet 21.11.2024 08:29:49
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. ...