CVE Alert: CVE-2024-55891
Vulnerability Summary: CVE-2024-55891
TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability.
Affected Endpoints:
No affected endpoints listed.
Published Date:
1/14/2025, 8:15:28 PM
❄️ CVSS Score:
Exploit Status:
Not ExploitedReferences:
- https://github.com/TYPO3/typo3/security/advisories/GHSA-38×7-cc6w-j27q
- https://typo3.org/security/advisory/typo3-core-sa-2025-001
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.