Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-0055 | TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-38x7-cc6w-j27q | TYPO3 Information Disclosure via Exception Handling/Logger |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Aug 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:typo3:typo3:13.4.2:*:*:*:*:*:*:* |
Wed, 15 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Jan 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability. | |
| Title | Information Disclosure via Exception Handling/Logger in TYPO3 | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-15T15:02:46.106Z
Reserved: 2024-12-12T15:03:39.205Z
Link: CVE-2024-55891
Updated: 2025-01-15T15:02:42.868Z
Status : Analyzed
Published: 2025-01-14T20:15:28.773
Modified: 2025-08-26T18:52:53.197
Link: CVE-2024-55891
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:15:05Z
EUVD
Github GHSA