The vulnerability stems from improper separation of system/user configurations in TYPO3's Form Framework. The core issue involves two key components:
-
YAML Parsing: The advisory indicates malicious instructions could be injected into form definition files. This strongly suggests the YAML parser (YamlParser::parse) lacked safeguards against deserializing dangerous constructs, enabling code execution (CWE-94).
-
Form Persistence: The ability to inject malicious content via both the form editor and file upload implies the save mechanism (FormEditorController::saveAction) did not properly validate or restrict user-modifiable fields, allowing attackers to overwrite system-critical configurations stored in YAML files. This facilitated privilege escalation and SQL injection via manipulated form definitions.
The introduction of the '.form.yaml' suffix in patches further supports that file processing logic in these components was central to the vulnerability, as the fix required explicit file type differentiation.