CVE-2026-8827
Description
The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The tt_address extension's AddressRepository::getSqlQuery() method lacks input sanitization, enabling SQL injection if called by custom code.
Vulnerability
Description
The AddressRepository::getSqlQuery() method in the TYPO3 extension "Address List" (tt_address) constructs a database query without properly sanitizing user input, leading to SQL Injection [1]. This flaw exists because the method directly incorporates untrusted data into the SQL statement, violating secure coding practices for database queries.
Attack
Vector
The vulnerable method is not invoked anywhere within the extension itself [1]. Therefore, the default installation is not directly exploitable. The risk arises only when a custom extension calls getSqlQuery() with user-controlled or untrusted input. An attacker would need to find or create such a calling context to leverage the injection point.
Impact
Exploitation could allow an attacker with network access to execute arbitrary SQL commands against the database, potentially reading sensitive data (confidentiality impact is rated high in the CVSS score) [1]. However, the CVSS report notes that integrity and availability are not affected, and the attack requires specific preconditions (accessibility of the method via custom code).
Mitigation
Patched versions (10.0.1, 9.1.1, and 8.1.2) are available from the TYPO3 extension manager and Packagist [1]. Users of the extension are advised to update as soon as possible to eliminate the risk for custom implementations that may call the method.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.