Cross-site Scripting (XSS) Affecting typo3/cms package, versions >=11.0.0, <11.3.2>=10.0.0, <10.4.19>=9.0.0, <9.5.29>=8.0.0, <8.7.42>=0.0.0, <7.6.53


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-TYPO3CMS-1540309
  • published11 Aug 2021
  • disclosed11 Aug 2021
  • creditUnknown

Introduced: 11 Aug 2021

CVE-2021-32768  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade typo3/cms to version 11.3.2, 10.4.19, 9.5.29, 8.7.42, 7.6.53 or higher.

Overview

typo3/cms is a free open source Content Management Framework.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to a failure to properly parse, sanitize and encode malicious rich-text content, leading to the content rendering process in the website frontend being vulnerable to cross-site scripting.

Corresponding rendering instructions via TypoScript functionality HTMLparser does not consider all potentially malicious HTML tag & attribute combinations per default. In default scenarios, a valid backend user account is needed to exploit this vulnerability. In case custom plugins used in the website frontend accept and reflect rich-text content submitted by users, no authentication is required.

CVSS Scores

version 3.1