Description
The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the "Date Menu of news articles" plugin. Exploitation requires the "Date Menu of news articles" plugin to be in use and the TypoScript/Plugin setting disableOverrideDemand not to be enabled.
Published: 2026-05-19
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a classic SQL injection in the TYPO3 News system extension. Untrusted data from a URL parameter is concatenated directly into a database query when the Date Menu of news articles plugin is active. An attacker can inject arbitrary SQL commands, which can read sensitive data, modify records, or delete data, potentially leading to full database compromise. The weakness corresponds to CWE‑89 and could be leveraged by anyone who can access the vulnerable URL, without authentication.

Affected Systems

Affected systems are installations of the TYPO3 News system extension, particularly when the Date Menu of news articles plugin is enabled. The vulnerability applies to any version of the extension where the TypoScript/Plugin setting disableOverrideDemand is not enabled. The extension is distributed by the TYPO3 community, and all users of the news extension with the plugin in use are impacted.

Risk and Exploitability

The reported CVSS score of 8.2 indicates a high severity, with an availability of the provisioned attack path alone. The EPSS score is not available, but the lack of a KEV listing does not reduce the actual risk. An unauthenticated attacker can trigger the flaw by crafting a URL with a malicious parameter, and the environment requirement of the specific plugin makes detection difficult. Given the high impact score and the ease of exploitation, the risk to affected systems is considerable, especially if no mitigation measures such as disabling the plugin or enabling strict TypoScript settings are applied.

Generated by OpenCVE AI on May 19, 2026 at 11:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest patched release of the News system extension from the TYPO3 repository.
  • If immediate patching is not possible, disable or remove the Date Menu of news articles plugin from the site configuration.
  • Enable the TypoScript/Plugin setting disableOverrideDemand to prevent the plugin from processing overrides that facilitate injection.
  • Monitor database query logs for suspicious patterns and perform a post‑incident review after any update.

Generated by OpenCVE AI on May 19, 2026 at 11:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Typo3
Typo3 extension "news System"
Vendors & Products Typo3
Typo3 extension "news System"

Tue, 19 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description The extension fails to properly sanitize user input before using it in a database query. As a result, an unauthenticated attacker can inject arbitrary SQL through a URL parameter on pages using the "Date Menu of news articles" plugin. Exploitation requires the "Date Menu of news articles" plugin to be in use and the TypoScript/Plugin setting disableOverrideDemand not to be enabled.
Title SQL Injection in extension "News system" (news)
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Typo3 Extension "news System"
cve-icon MITRE

Status: PUBLISHED

Assigner: TYPO3

Published:

Updated: 2026-05-19T13:23:36.360Z

Reserved: 2026-05-16T09:55:31.608Z

Link: CVE-2026-8726

cve-icon Vulnrichment

Updated: 2026-05-19T13:23:33.114Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T10:16:25.603

Modified: 2026-05-19T14:47:13.200

Link: CVE-2026-8726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:39:38Z

Weaknesses