Vulnerability Description
TYPO3 is an open source PHP based web content management system. Versions 9.0.0 through 9.5.28, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0 have a cross-site scripting vulnerability. When _Page TSconfig_ settings are not properly encoded, corresponding page preview module (_Web>View_) is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability. TYPO3 versions 9.5.29, 10.4.18, 11.3.1 contain a patch for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | >= 9.0.0, <= 9.5.287 |
Related Weaknesses (CWE)
References
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wfThird Party Advisory
- https://typo3.org/security/advisory/typo3-core-sa-2021-009Vendor Advisory
- https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wfThird Party Advisory
- https://typo3.org/security/advisory/typo3-core-sa-2021-009Vendor Advisory
FAQ
What is CVE-2021-32667?
CVE-2021-32667 is a vulnerability with a CVSS score of 6.4 (MEDIUM). TYPO3 is an open source PHP based web content management system. Versions 9.0.0 through 9.5.28, 10.0.0 through 10.4.17, and 11.0.0 through 11.3.0 have a cross-site scripting vulnerability. When _Page ...
How severe is CVE-2021-32667?
CVE-2021-32667 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32667?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3.