First published: Tue Dec 13 2022(Updated: )
TYPO3 is an open source PHP based web content management system. Versions prior to 8.7.49, 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are vulnerable to Code Injection. Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it is possible to inject code instructions to be processed and executed via TypoScript as PHP code. The existence of individual TypoScript instructions for a particular form item and a valid backend user account with access to the form module are needed to exploit this vulnerability. This issue is patched in versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
composer/typo3/cms | >=10.0.0<10.4.33>=11.0.0<11.5.20>=12.0.0<12.1.1 | |
Typo3 Typo3 | >=8.0.0<8.7.49 | |
Typo3 Typo3 | >=9.0.0<9.5.38 | |
Typo3 Typo3 | >=10.0.0<10.4.33 | |
Typo3 Typo3 | >=11.0.0<11.5.20 | |
Typo3 Typo3 | >=12.0.0<12.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
TYPO3-CORE-SA-2022-015 is a vulnerability within TYPO3 CMS that allows for arbitrary code execution via the Form Framework.
Versions prior to 8.7.49, 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are vulnerable to TYPO3-CORE-SA-2022-015.
TYPO3-CORE-SA-2022-015 has a severity score of 8.8, which is considered high.
To fix TYPO3-CORE-SA-2022-015, you should update TYPO3 CMS to version 8.7.49, 9.5.38, 10.4.33, 11.5.20, or 12.1.1.
More information about TYPO3-CORE-SA-2022-015 can be found in the TYPO3 security advisory TYPO3-CORE-SA-2022-015 and the GitHub security advisories GHSA-c5wx-6c2c-f7rm.