TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6755 TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.
Github GHSA Github GHSA GHSA-9c6w-55cp-5w25 TYPO3 CMS Stored Cross-Site Scripting via FileDumpController
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-23T17:11:32.639Z

Reserved: 2022-07-15T00:00:00.000Z

Link: CVE-2022-36107

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-13T18:15:15.227

Modified: 2024-11-21T07:12:24.283

Link: CVE-2022-36107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.