{"api_version":"1","generated_at":"2026-04-21T16:18:27+00:00","cve":"CVE-2022-36108","urls":{"html":"https://cve.report/CVE-2022-36108","api":"https://cve.report/api/cve/CVE-2022-36108.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-36108","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-36108"},"summary":{"title":"CVE-2022-36108","description":"TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `f:asset.css` view helper is vulnerable to cross-site scripting when user input is passed as variables to the CSS. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-13 18:15:00","updated_at":"2022-09-16 14:25:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85","refsource":"CONFIRM","tags":[],"title":"Cross-Site Scripting in <f:asset.css> view helper · Advisory · TYPO3/typo3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4","name":"https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4","refsource":"MISC","tags":[],"title":"[SECURITY] Encode child node variables in f:asset.css view helper · TYPO3/typo3@6863f73 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2022-010","name":"https://typo3.org/security/advisory/typo3-core-sa-2022-010","refsource":"MISC","tags":[],"title":"TYPO3-CORE-SA-2022-010: Cross-Site Scripting in <f:asset.css> view helper","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-36108","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36108","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"36108","vulnerable":"1","versionEndIncluding":"10.4.31","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"36108","vulnerable":"1","versionEndIncluding":"11.5.15","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-36108","STATE":"PUBLIC","TITLE":"Cross-Site Scripting in typo3/cms-core"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"typo3","version":{"version_data":[{"version_value":">= 10.3.0, < 10.4.32"},{"version_value":">= 11.0.0, < 11.5.16"}]}}]},"vendor_name":"TYPO3"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `f:asset.css` view helper is vulnerable to cross-site scripting when user input is passed as variables to the CSS. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85","refsource":"CONFIRM","url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85"},{"name":"https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4","refsource":"MISC","url":"https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4"},{"name":"https://typo3.org/security/advisory/typo3-core-sa-2022-010","refsource":"MISC","url":"https://typo3.org/security/advisory/typo3-core-sa-2022-010"}]},"source":{"advisory":"GHSA-fv2m-9249-qx85","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-13 18:15:00","lastModifiedDate":"2022-09-16 14:25:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndIncluding":"10.4.31","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndIncluding":"11.5.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}