{"api_version":"1","generated_at":"2026-04-21T16:19:43+00:00","cve":"CVE-2022-31047","urls":{"html":"https://cve.report/CVE-2022-31047","api":"https://cve.report/api/cve/CVE-2022-31047.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31047","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31047"},"summary":{"title":"CVE-2022-31047","description":"TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-06-14 21:15:00","updated_at":"2023-07-24 13:30:00"},"problem_types":["CWE-209"],"metrics":[],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99","refsource":"CONFIRM","tags":[],"title":"Information Disclosure via Exception Handling/Logger · Advisory · TYPO3/typo3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2022-002","name":"https://typo3.org/security/advisory/typo3-core-sa-2022-002","refsource":"MISC","tags":[],"title":"TYPO3-CORE-SA-2022-002: Information Disclosure via Exception Handling/Logger","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a","name":"https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a","refsource":"MISC","tags":[],"title":"[SECURITY] Do not log stacktrace in exception handlers · TYPO3/typo3@c93ea69 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31047","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31047","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31047","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"31047","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"elts","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31047","STATE":"PUBLIC","TITLE":"Insertion of Sensitive Information into Log File in typo3/cms-core"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"typo3","version":{"version_data":[{"version_value":">= 7.0.0, < 7.6.57"},{"version_value":">= 8.0.0, < 8.7.47"},{"version_value":">= 9.0.0, < 9.5.34"},{"version_value":">= 10.0.0, < 10.4.29"},{"version_value":">= 11.0.0, < 11.5.11"}]}}]},"vendor_name":"TYPO3"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532: Insertion of Sensitive Information into Log File"}]}]},"references":{"reference_data":[{"name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99","refsource":"CONFIRM","url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99"},{"name":"https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a","refsource":"MISC","url":"https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a"},{"name":"https://typo3.org/security/advisory/typo3-core-sa-2022-002","refsource":"MISC","url":"https://typo3.org/security/advisory/typo3-core-sa-2022-002"}]},"source":{"advisory":"GHSA-fh99-4pgr-8j99","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-06-14 21:15:00","lastModifiedDate":"2023-07-24 13:30:00","problem_types":["CWE-209"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.29","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.7.47","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.5.35","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.6.57","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}