Impact
The TYPO3 extension "Mailqueue" contains an insecure deserialization flaw where it fails to define allowed classes when deserializing transport failure metadata. An attacker who can supply crafted serialized data may be able to execute arbitrary code, a classic Remote Code Execution scenario. This vulnerability is classified as CWE‑502: Deserialization of Untrusted Data.
Affected Systems
All installations of the TYPO3 Mailqueue extension that include the vulnerable deserialization logic may be affected. No specific version list is provided in the CNA data, so all versions should be evaluated until a patch is released.
Risk and Exploitability
The CVSS score of 5.2 indicates moderate severity, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires write access to the directory specified by $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'], which may limit the attack surface to users with file system write privileges. Nevertheless, the potential for remote code execution warrants immediate attention.
OpenCVE Enrichment
Github GHSA