{"api_version":"1","generated_at":"2026-04-23T09:53:00+00:00","cve":"CVE-2022-23502","urls":{"html":"https://cve.report/CVE-2022-23502","api":"https://cve.report/api/cve/CVE-2022-23502.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23502","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23502"},"summary":{"title":"CVE-2022-23502","description":"TYPO3 is an open source PHP based web content management system. In versions prior to 10.4.33, 11.5.20, and 12.1.1, When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. This issue is patched in versions 10.4.33, 11.5.20, 12.1.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-14 08:15:00","updated_at":"2022-12-16 17:55:00"},"problem_types":["CWE-613"],"metrics":[],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr","refsource":"MISC","tags":[],"title":"Insufficient Session Expiration after Password Reset · Advisory · TYPO3/typo3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23502","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23502","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23502","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23502","qid":"691011","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for typo3 (d9e154c9-7de9-11ed-adca-080027d3a315)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23502","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"TYPO3 is an open source PHP based web content management system. In versions prior to 10.4.33, 11.5.20, and 12.1.1, When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. This issue is patched in versions 10.4.33, 11.5.20, 12.1.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-613: Insufficient Session Expiration","cweId":"CWE-613"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"TYPO3","product":{"product_data":[{"product_name":"typo3","version":{"version_data":[{"version_value":">= 10.0.0, < 10.4.33","version_affected":"="},{"version_value":">= 11.0.0, < 11.5.20","version_affected":"="},{"version_value":">= 12.0.0, < 12.1.1","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr","refsource":"MISC","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr"}]},"source":{"advisory":"GHSA-mgj2-q8wp-29rr","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-14 08:15:00","lastModifiedDate":"2022-12-16 17:55:00","problem_types":["CWE-613"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.33","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23502","Ordinal":"226411","Title":"CVE-2022-23502","CVE":"CVE-2022-23502","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23502","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}