VYPR
High severityNVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-8827

CVE-2026-8827

Description

The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The tt_address extension's AddressRepository::getSqlQuery() method lacks input sanitization, enabling SQL injection if called by custom code.

Vulnerability

Description

The AddressRepository::getSqlQuery() method in the TYPO3 extension "Address List" (tt_address) constructs a database query without properly sanitizing user input, leading to SQL Injection [1]. This flaw exists because the method directly incorporates untrusted data into the SQL statement, violating secure coding practices for database queries.

Attack

Vector

The vulnerable method is not invoked anywhere within the extension itself [1]. Therefore, the default installation is not directly exploitable. The risk arises only when a custom extension calls getSqlQuery() with user-controlled or untrusted input. An attacker would need to find or create such a calling context to leverage the injection point.

Impact

Exploitation could allow an attacker with network access to execute arbitrary SQL commands against the database, potentially reading sensitive data (confidentiality impact is rated high in the CVSS score) [1]. However, the CVSS report notes that integrity and availability are not affected, and the attack requires specific preconditions (accessibility of the method via custom code).

Mitigation

Patched versions (10.0.1, 9.1.1, and 8.1.2) are available from the TYPO3 extension manager and Packagist [1]. Users of the extension are advised to update as soon as possible to eliminate the risk for custom implementations that may call the method.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.