Description
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions the login screen of the standalone install tool discloses the full path of the transient data directory (e.g. /var/www/html/var/transient/). This applies to composer-based scenarios only - “classic” non-composer installations are not affected. This issue has been addressed in version 12.4.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/TYPO3/typo3/security/advisories/GHSA-p2jh-95jg-2w55
Patch x_refsource_misc
https://github.com/TYPO3/typo3/commit/1a735dac01ec7b337ed0d80c738caa8967dea423
Vendor Advisory x_refsource_misc
https://typo3.org/security/advisory/typo3-core-sa-2023-005
Scores
CVSS v3
3.7
EPSS
0.0021
EPSS Percentile
43.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-200
Status
published
Products (2)
typo3/cms-install
12.2.0 - 12.4.8Packagist
typo3/typo3
12.2.0 - 12.4.8
Published
Nov 14, 2023
Tracked Since
Feb 18, 2026