CVE-2022-36106: TYPO3 CMS missing check for expiration time of password reset token for backend users
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53144%
CWE
Published
9/16/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms-core | composer | >= 10.4.0, < 10.4.32 | 10.4.32 |
| typo3/cms-core | composer | >= 11.0.0, < 11.5.16 | 11.5.16 |
| typo3/cms | composer | >= 10.4.0, < 10.4.32 | 10.4.32 |
| typo3/cms | composer | >= 11.0.0, < 11.5.16 | 11.5.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing expiration time validation in the token verification process. The patch adds an explicit check comparing $expirationTimestamp with the current time in findValidUserForToken. Since this was the only security-related code change shown in the commit diff and directly matches the vulnerability description, we can conclusively identify this function as the vulnerable component.