CVE-2026-4208: Authentication Bypass in extension "E-Mail MFA Provider" (mfa_email)
(updated )
The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.
References
- github.com/MrSilaz/mfa_email
- github.com/MrSilaz/mfa_email/commit/0bb7e85b236a5232f7b092915453dd7c3da48f12
- github.com/MrSilaz/mfa_email/releases/tag/v1.0.7
- github.com/MrSilaz/mfa_email/releases/tag/v2.0.1
- github.com/advisories/GHSA-29r8-gvx4-r9w3
- nvd.nist.gov/vuln/detail/CVE-2026-4208
- typo3.org/security/advisory/typo3-ext-sa-2026-007
Code Behaviors & Features
Detect and mitigate CVE-2026-4208 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →