
Cloud Vulnerability DB
A community-led vulnerabilities database
TYPO3 CMS Form Framework (ext:form) was discovered to be vulnerable to cross-site scripting (CVE-2022-31048). The vulnerability was identified in versions 8.0.0-8.7.46 ELTS, 9.0.0-9.5.34 ELTS, 10.0.0-10.4.28, and 11.0.0-11.5.10, and was disclosed on June 14, 2022. The Form Designer backend module was specifically affected by this security issue (TYPO3 Advisory).
The vulnerability is classified as a Cross-Site Scripting (CWE-79) issue with a CVSS v3.1 base score of 4.9, indicating moderate severity. The attack vector is Network-based (AV:N), with Low attack complexity (AC:L), requiring Low privileges (PR:L) and User interaction (UI:R). The scope is Changed (S:C), with Low impact on both Confidentiality (C:L) and Integrity (I:L), and No impact on Availability (A:N) (GitHub Advisory).
The vulnerability allows for cross-site scripting attacks through the Form Designer backend module. The impact is limited as it requires a valid backend user account with access to the form module to exploit the vulnerability. When successfully exploited, it could lead to unauthorized script execution in the context of other users' browsers (TYPO3 Advisory).
The vulnerability has been fixed in TYPO3 versions 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, and 11.5.11. Users are advised to update to these patched versions to address the security issue. The fix involves ensuring text preview of multivalue items in the form editor and proper text handling instead of HTML interpretation (TYPO3 Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."