-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper session timeout handling in TYPO3's authentication component. Key session management methods in AbstractUserAuthentication (the core authentication class) are the most probable candidates. The 'gc' method handles session cleanup, and a flawed implementation would leave expired sessions active. 'fetchUserSession' might have failed to validate() session expiration during authentication checks. While exact pre-patch code isn't available, TYPO3's architecture and CWE-287 context strongly implicate these methods. Confidence is medium due to lack of direct code references but aligns with described vulnerability mechanics.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms | composer | >= 6.2.0, < 6.2.3 | 6.2.3 |
KEV Misses 88% of Exploited CVEs- Get the report