CVE-2024-38874:
events2 TYPO3 extension insecure direct object reference (IDOR) vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55211%
CWE
Published
6/21/2024
Updated
8/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
jweiland/events2 | composer | < 8.3.8 | 8.3.8 |
jweiland/events2 | composer | >= 9.0.0, < 9.0.6 | 9.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions missing access checks in the management plugin for activation/deletion operations. In TYPO3 architecture, these operations would typically be handled by controller actions. The combination of user-controlled event IDs (CWE-639) and lack of permission verification in these CRUD operations matches the described attack pattern. The high confidence comes from the direct correlation between the described vulnerability type (IDOR in management plugin) and standard TYPO3 extension patterns where controller actions handle such operations.