-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms | composer | >= 6.2.0, < 6.2.6 | 6.2.6 |
| typo3/cms | composer | >= 6.1.0, < 6.1.12 | 6.1.12 |
| typo3/cms | composer | >= 4.7.0, < 4.7.20 | 4.7.20 |
| typo3/cms | composer | >= 4.5.0, < 4.5.37 | 4.5.37 |
The vulnerability stems from improper shell argument sanitization in the sendmail command construction. The commit diff shows the fix adds escapeshellarg() around the _getReversePath() return value, which is derived from the message's 'From' header. This directly indicates that the unescaped _getReversePath() value in the original code allowed command injection when building the sendmail command line. The affected code path is only triggered when using 'sendmail' transport mode, matching the vulnerability description.