Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms-install
  4. ›
  5. CVE-2024-55891

CVE-2024-55891: TYPO3 Information Disclosure via Exception Handling/Logger

January 14, 2025

Problem

It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect.

Solution

Update to TYPO3 versions 13.4.3 LTS that fixes the problem described.

Credits

Thanks to TYPO3 core & security team member Oliver Hader who reported and fixed the issue.

References

  • TYPO3-CORE-SA-2025-001

References

  • github.com/TYPO3-CMS/install
  • github.com/TYPO3-CMS/install/commit/baa8089b1baf5552fab213a5761081608b0afc51
  • github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q
  • github.com/advisories/GHSA-38x7-cc6w-j27q
  • nvd.nist.gov/vuln/detail/CVE-2024-55891
  • typo3.org/security/advisory/typo3-core-sa-2025-001

Code Behaviors & Features

Detect and mitigate CVE-2024-55891 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 13.4.2 before 13.4.3, version 13.4.2

Fixed versions

  • 13.4.3

Solution

Upgrade to version 13.4.3 or above.

Impact 3.1 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

packagist/typo3/cms-install/CVE-2024-55891.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.