Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms-core
  4. ›
  5. CVE-2020-26229

CVE-2020-26229: Improper Restriction of XML External Entity Reference

November 23, 2020 (updated December 1, 2020)

TYPO3 is an open source PHP based web content management system. In TYPO3 from, and, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability with current PHP versions of supported and maintained system distributions. At least with libxml2, the processing of XML external entities is disabled per default - and cannot be exploited. Besides that, a valid backend user account is needed.

References

  • nvd.nist.gov/vuln/detail/CVE-2020-26229
  • typo3.org/security/advisory/typo3-core-sa-2020-012

Code Behaviors & Features

Detect and mitigate CVE-2020-26229 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.0.0 before 10.4.10

Fixed versions

  • 10.4.10

Solution

Upgrade to version 10.4.10 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-611: Improper Restriction of XML External Entity Reference

Source file

packagist/typo3/cms-core/CVE-2020-26229.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:13 +0000.