-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms | composer | >= 6.2.0, < 6.2.16 | 6.2.16 |
| typo3/cms | composer | >= 7.0.0, < 7.6.1 | 7.6.1 |
The vulnerability stems from improper input validation in link handling. The commit diff shows security fixes were applied to ContentObjectRenderer::typoLink, specifically adding checks for 'javascript:' URI scheme. This function is responsible for processing typolinks, and its lack of scheme validation in vulnerable versions allowed execution of arbitrary JavaScript via crafted links. The direct modification of this function in the security patch confirms its role in the vulnerability.
A Semantic Attack on Google Gemini - Read the Latest Research