GHSA-wg8h-gxf4-g4gh: TYPO3 Cross-Site Scripting in Online Media Asset Rendering
6.1
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
5/30/2024
Updated
5/30/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| typo3/cms-core | composer | >= 8.0.0, < 8.7.21 | 8.7.21 |
| typo3/cms-core | composer | >= 9.0.0, < 9.5.2 | 9.5.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from multiple layers of insufficient encoding:
- URL construction functions (getPublicUrl/getOEmbedUrl) failed to properly encode video IDs using rawurlencode(), allowing injection of malicious payloads into URLs
- Renderer classes directly inserted unescaped video URLs into iframe src attributes
- Attribute collection methods concatenated user-controlled parameters (like 'class', 'onclick') without HTML entity encoding
The commit patches show critical additions of rawurlencode() for video IDs and htmlspecialchars() for HTML attributes, confirming these were the vulnerable points. Test cases added in the commit specifically validate XSS escaping scenarios.