SB20260114124 - Multiple vulnerabilities in TYPO3



SB20260114124 - Multiple vulnerabilities in TYPO3

Published: January 14, 2026

Security Bulletin ID SB20260114124
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2026-0859)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within Mailer File Spool during the mailer:spool:send command. A local user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Incorrect authorization (CVE-ID: CVE-2025-59020)

The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to broken access control in Edit Document within the defVals parameter. A remote user can insert arbitrary data into prohibited exclude fields of a database table.


3) Missing Authorization (CVE-ID: CVE-2025-59021)

The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to broken access control in Redirects Module. A remote user can insert or alter redirects pointing to arbitrary URLs.


4) Missing Authorization (CVE-ID: CVE-2025-59022)

The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to broken access control in Recycler Module. A remote user can delete arbitrary data from any database table defined in the TCA.


Remediation

Install update from vendor's website.