-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| t3/dce | composer | < 0.11.5 | 0.11.5 |
The vulnerability stems from the default-enabled update check mechanism transmitting environment data. The security bulletin explicitly identifies the update check functionality as the leak vector, and the patch (0.11.5) introduced a configuration option to disable it. The UpdateCheckService would logically contain the method responsible for performing these unauthorized data transmissions. While exact code isn't available, TYPO3 extension patterns and vulnerability description strongly indicate this component as the source.
A Semantic Attack on Google Gemini - Read the Latest Research