Cross-Site Scripting in Frontend Login Mailer
Description
TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, user submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
TYPO3 CMS fails to encode user-submitted content in HTML emails, enabling XSS attacks via mail clients.
Vulnerability
In TYPO3 CMS versions prior to 9.5.34 ELTS, 10.4.29, and 11.5.11, user-submitted content is incorporated into HTML-formatted emails without proper encoding. This allows malicious input to be interpreted as active HTML or JavaScript when the email is rendered in a mail client. The affected component is the mail template rendering logic that builds notification or confirmation emails using unescaped user data [1][2].
Exploitation
An attacker needs the ability to submit content that will later be included in an HTML email sent to another user (e.g., via a comment, form submission, or profile field). No special network position or authentication level is required beyond the privileges needed to provide that content. The attack is triggered when the victim reads the email using an HTML-capable mail client; no user interaction beyond opening the message is necessary [1].
Impact
Successful exploitation leads to cross-site scripting (XSS) within the context of the recipient's email client. The attacker may execute arbitrary JavaScript, steal session tokens, redirect to phishing pages, or perform other actions limited by the mail client's security model. The impact is primarily on the confidentiality and integrity of the victim's session and data [1].
Mitigation
TYPO3 CMS versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix that properly encodes user-submitted content before inclusion in HTML emails. All sites should upgrade to one of these patched releases immediately. No workarounds are documented; configuring mail clients to render emails as plain text can reduce risk but is not a complete mitigation [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
typo3/cms-corePackagist | >= 9.0.0, < 9.5.35 | 9.5.35 |
typo3/cms-corePackagist | >= 10.0.0, < 10.4.29 | 10.4.29 |
typo3/cms-corePackagist | >= 11.0.0, < 11.5.11 | 11.5.11 |
typo3/cmsPackagist | >= 10.0.0, < 10.4.29 | 10.4.29 |
typo3/cmsPackagist | >= 11.0.0, < 11.5.11 | 11.5.11 |
Affected products
4- osv-coords3 versions
>= 9.0.0, < 9.5.35+ 2 more
- (no CPE)range: >= 9.0.0, < 9.5.35
- (no CPE)range: >= 10.0.0, < 10.4.29
- (no CPE)range: >= 9.0.0, < 9.5.35
Patches
1da611775f921[SECURITY] Avoid HTML injection in password recovery mail
1 file changed · +1 −1
typo3/sysext/felogin/Resources/Private/Email/Templates/PasswordRecovery.html+1 −1 modified@@ -9,7 +9,7 @@ {f:translate( key: 'forgot_validate_reset_password_html', extensionName: 'felogin', - arguments: '{ 0: receiverName, 1: recoveryLink, 2: validUntil }' + arguments: '{ 0: "{receiverName -> f:format.htmlspecialchars()}", 1: recoveryLink, 2: validUntil }' ) -> f:format.html()} </f:spaceless> </f:section>
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-h4mx-xv96-2jgmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-31049ghsaADVISORY
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31049.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31049.yamlghsaWEB
- github.com/TYPO3/typo3/commit/da611775f92102d7602713003f4c79606c8a445dghsax_refsource_MISCWEB
- github.com/TYPO3/typo3/security/advisories/GHSA-h4mx-xv96-2jgmghsax_refsource_CONFIRMWEB
- typo3.org/security/advisory/typo3-core-sa-2022-004ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.