Vulnerability Description
TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitrary PHP code execution on the web server. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typo3 | Typo3 | >= 10.0.0, < 10.4.55 |
Related Weaknesses (CWE)
References
- https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782fPatch
- https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13Patch
- https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27fPatch
- https://typo3.org/security/advisory/typo3-core-sa-2026-004Vendor Advisory
FAQ
What is CVE-2026-0859?
CVE-2026-0859 is a vulnerability with a CVSS score of 7.8 (HIGH). TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitr...
How severe is CVE-2026-0859?
CVE-2026-0859 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0859?
Check the references section above for vendor advisories and patch information. Affected products include: Typo3 Typo3.