CVE-2024-55891

TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:typo3:typo3:13.4.2:*:*:*:*:*:*:*

History

26 Aug 2025, 18:52

Type Values Removed Values Added
Summary
  • (es) TYPO3 es un framework gestor de contenidos gratuito y de código abierto. Se ha descubierto que la contraseña de la herramienta de instalación se ha registrado como texto plano en caso de que el mecanismo de hash de contraseñas utilizado para la contraseña fuera incorrecto. Se recomienda a los usuarios que actualicen a la versión 13.4.3 ELTS de TYPO3, que soluciona el problema descrito. No se conocen Workarounds para esta vulnerabilidad.
CPE cpe:2.3:a:typo3:typo3:13.4.2:*:*:*:*:*:*:*
First Time Typo3 typo3
Typo3
References () https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q - () https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q - Vendor Advisory
References () https://typo3.org/security/advisory/typo3-core-sa-2025-001 - () https://typo3.org/security/advisory/typo3-core-sa-2025-001 - Vendor Advisory

14 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-14 20:15

Updated : 2025-08-26 18:52


NVD link : CVE-2024-55891

Mitre link : CVE-2024-55891

CVE.ORG link : CVE-2024-55891


JSON object : View

Products Affected

typo3

  • typo3
CWE
CWE-532

Insertion of Sensitive Information into Log File