CVE-2022-36020:
TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection
6.1
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
typo3/html-sanitizer | composer | >= 1.0.0, < 1.0.7 | 1.0.7 |
typo3/html-sanitizer | composer | >= 2.0.0, < 2.0.16 | 2.0.16 |
typo3/cms-core | composer | >= 10.0.0, < 10.4.32 | 10.4.32 |
typo3/cms-core | composer | >= 11.0.0, < 11.5.16 | 11.5.16 |
typo3/cms | composer | >= 10.0.0, < 10.4.32 | 10.4.32 |
typo3/cms | composer | >= 11.0.0, < 11.5.16 | 11.5.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a parsing issue in the upstream package masterminds/html5
, which the TYPO3 HTML sanitizer (typo3/html-sanitizer
) depends on. The TYPO3 packages themselves do not contain the vulnerable parsing logic but rely on the outdated masterminds/html5
library. The vulnerability occurs because the parser fails to correctly handle HTML comments followed by malicious markup, allowing XSS bypass. The fix involved updating the dependency to a patched version of masterminds/html5
, indicating the root cause was in the third-party library. No specific functions within the TYPO3 packages (e.g., typo3/html-sanitizer
) were identified as directly vulnerable with high confidence; the issue arises from the integration of the vulnerable external parser.