Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. in2code/powermail
  4. ›
  5. CVE-2014-6288

CVE-2014-6288: TYPO3 powermail extension allows remote attackers to bypass CAPTCHA protection mechanism

May 17, 2022 (updated April 14, 2025)

The powermail extension 2.x before 2.0.11 for TYPO3 allows remote attackers to bypass the CAPTCHA protection mechanism via unspecified vectors.

References

  • github.com/advisories/GHSA-2jq7-pgqq-gqqj
  • github.com/in2code-de/powermail
  • nvd.nist.gov/vuln/detail/CVE-2014-6288
  • typo3.org/security/advisory/typo3-ext-sa-2014-006

Code Behaviors & Features

Detect and mitigate CVE-2014-6288 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.0.11

Fixed versions

  • 2.0.11

Solution

Upgrade to version 2.0.11 or above.

Impact 7.5 HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

packagist/in2code/powermail/CVE-2014-6288.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 07:27:40 +0000.