{"api_version":"1","generated_at":"2026-04-21T16:21:08+00:00","cve":"CVE-2022-23504","urls":{"html":"https://cve.report/CVE-2022-23504","api":"https://cve.report/api/cve/CVE-2022-23504.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23504","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23504"},"summary":{"title":"CVE-2022-23504","description":"TYPO3 is an open source PHP based web content management system. Versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are subject to Sensitive Information Disclosure. Due to the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors. A valid backend user account having administrator privileges is needed to exploit this vulnerability. This issue has been patched in versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-14 08:15:00","updated_at":"2022-12-16 17:53:00"},"problem_types":["CWE-917"],"metrics":[],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr","refsource":"MISC","tags":[],"title":"Sensitive Information Disclosure via YAML Placeholder Expressions in Site Configuration · Advisory · TYPO3/typo3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23504","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23504","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23504","qid":"691011","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for typo3 (d9e154c9-7de9-11ed-adca-080027d3a315)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23504","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"TYPO3 is an open source PHP based web content management system. Versions prior to 9.5.38, 10.4.33, 11.5.20, and 12.1.1 are subject to Sensitive Information Disclosure. Due to the lack of handling user-submitted YAML placeholder expressions in the site configuration backend module, attackers could expose sensitive internal information, such as system configuration or HTTP request messages of other website visitors. A valid backend user account having administrator privileges is needed to exploit this vulnerability. This issue has been patched in versions 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]},{"description":[{"lang":"eng","value":"CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')","cweId":"CWE-917"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"TYPO3","product":{"product_data":[{"product_name":"typo3","version":{"version_data":[{"version_value":">= 9.0.0, < 9.5.38","version_affected":"="},{"version_value":">= 10.0.0, < 10.4.33","version_affected":"="},{"version_value":">= 11.0.0, < 11.5.20","version_affected":"="},{"version_value":">= 12.0.0, < 12.1.1","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr","refsource":"MISC","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-8w3p-qh3x-6gjr"}]},"source":{"advisory":"GHSA-8w3p-qh3x-6gjr","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-14 08:15:00","lastModifiedDate":"2022-12-16 17:53:00","problem_types":["CWE-917"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.33","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.5.38","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23504","Ordinal":"226389","Title":"CVE-2022-23504","CVE":"CVE-2022-23504","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23504","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}