First published: Tue Sep 13 2022(Updated: )
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `f:asset.css` view helper is vulnerable to cross-site scripting when user input is passed as variables to the CSS. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/typo3/cms-core | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
composer/typo3/cms | >=10.0.0<10.4.32>=11.0.0<11.5.16 | |
Typo3 Typo3 | >=10.0.0<=10.4.31 | |
Typo3 Typo3 | >=11.0.0<=11.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36108 is a vulnerability in TYPO3 that allows for cross-site scripting (XSS) attacks when user input is passed as variables to the CSS.
CVE-2022-36108 affects TYPO3 versions 10.0.0 to 10.4.31 and 11.0.0 to 11.5.15, allowing for potential XSS attacks.
CVE-2022-36108 has a severity rating of 6.1 (medium).
To fix CVE-2022-36108, update your TYPO3 installation to version 10.4.32 or 11.5.16.
You can find more information about CVE-2022-36108 at the TYPO3 security advisory page (https://typo3.org/security/advisory/typo3-core-sa-2022-010) and the GitHub commit and advisory pages (https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4, https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85).