Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms
  4. ›
  5. CVE-2022-36106

CVE-2022-36106: Improper Authentication

September 13, 2022 (updated September 16, 2022)

TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.

References

  • github.com/TYPO3/typo3/commit/56af2bd3a432156c30af9be71c9d6f7ef3a6159a
  • github.com/TYPO3/typo3/security/advisories/GHSA-5959-4x58-r8c2
  • nvd.nist.gov/vuln/detail/CVE-2022-36106
  • typo3.org/security/advisory/typo3-core-sa-2022-008

Code Behaviors & Features

Detect and mitigate CVE-2022-36106 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.0.0 up to 10.4.31, all versions starting from 11.0.0 up to 11.5.15

Fixed versions

  • 10.4.32
  • 11.5.16

Solution

Upgrade to versions 10.4.32, 11.5.16 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

packagist/typo3/cms/CVE-2022-36106.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.