Vulnerability Description
The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP objects, leading to Remote Code Execution on the TYPO3 server. Exploitation requires administrative privileges to configure a crawler-enabled page and trigger the crawl via a Scheduler task.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-8727?
CVE-2026-8727 is a documented vulnerability. The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP obje...
How severe is CVE-2026-8727?
CVSS scoring is not yet available for CVE-2026-8727. Check NVD for updates.
Is there a patch for CVE-2026-8727?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.