Description
The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.
Published: 2026-05-19
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The AddressRepository::getSqlQuery() method in the TYPO3 "Address List" extension constructs a database query without sanitizing user input, creating a classic SQL Injection flaw (CWE-89). When called with untrusted data, the flaw could let an attacker manipulate queries, potentially accessing, modifying, or deleting sensitive data, and in some cases trigger arbitrary code execution depending on database privileges. The vulnerability is not exercised internally by the extension in a default configuration, but any custom or extended code that calls this method directly is at risk.

Affected Systems

All installations of the TYPO3 "Address List" extension (tt_address) are potentially affected, as the issue exists in the extension code regardless of the version; specific version details are not provided. The risk materializes only if custom extensions or site code invoke AddressRepository::getSqlQuery() with user-controlled input. Default deployments that do not use the method remain unfazed.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity. The EPSS score is not available, and the vulnerability is not listed in CISA KEV, suggesting no public exploitation yet. The likely attack vector is through custom code that calls the vulnerable method; an attacker would need to inject crafted input into that call. Because the flaw allows arbitrary query manipulation, exploitation is serious but depends on the developer’s usage pattern. The absence of internal activation means the immediate threat is lower for vanilla installations, yet the high severity and lack of automatic mitigation warrant swift action.

Generated by OpenCVE AI on May 19, 2026 at 11:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the "Address List" extension to the latest version that sanitizes user input in getSqlQuery().
  • If an upgrade is not feasible, review custom extensions that use AddressRepository::getSqlQuery() and eliminate or bypass any calls that pass untrusted data.
  • Audit all custom code interacting with the extension to implement input validation or use prepared statements, ensuring that user-supplied values are properly escaped or parameterized.

Generated by OpenCVE AI on May 19, 2026 at 11:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Typo3
Typo3 extension "address List"
Vendors & Products Typo3
Typo3 extension "address List"

Tue, 19 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.
Title SQL Injection in extension "Address List" (tt_address)
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Typo3 Extension "address List"
cve-icon MITRE

Status: PUBLISHED

Assigner: TYPO3

Published:

Updated: 2026-05-19T13:31:11.513Z

Reserved: 2026-05-18T11:19:55.225Z

Link: CVE-2026-8827

cve-icon Vulnrichment

Updated: 2026-05-19T13:31:08.600Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T10:16:25.887

Modified: 2026-05-19T14:47:13.200

Link: CVE-2026-8827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:39:33Z

Weaknesses