TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q | Vendor Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2025-001 | Vendor Advisory |
Configurations
History
26 Aug 2025, 18:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:typo3:typo3:13.4.2:*:*:*:*:*:*:* | |
First Time |
Typo3 typo3
Typo3 |
|
References | () https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q - Vendor Advisory | |
References | () https://typo3.org/security/advisory/typo3-core-sa-2025-001 - Vendor Advisory |
14 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 20:15
Updated : 2025-08-26 18:52
NVD link : CVE-2024-55891
Mitre link : CVE-2024-55891
CVE.ORG link : CVE-2024-55891
JSON object : View
Products Affected
typo3
- typo3
CWE
CWE-532
Insertion of Sensitive Information into Log File