-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability centers around improper validation of redirect URLs in the access tracking mechanism. Multiple sources reference 'jumpurl' as the attack vector (e.g., openSUSE patch notes mention 'External URL regression by jumpurl security fix'). TYPO3's RedirectController typically processes redirects via the 'jumpurl' parameter. In vulnerable versions, this function likely failed to validate the URL's domain or whitelist, enabling open redirects. The correlation between the CWE-601 (Open Redirect) description and the 'jumpurl' handling mechanism strongly supports this assessment.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms-core | composer | >= 4.5.0, < 4.5.24 | 4.5.24 |
| typo3/cms-core | composer | >= 4.6.0, < 4.6.17 | 4.6.17 |
| typo3/cms-core |
| composer |
| >= 4.7.0, < 4.7.9 |
| 4.7.9 |
| typo3/cms-core | composer | >= 6.0.0, < 6.0.3 | 6.0.3 |
Ongoing coverage of React2Shell