CVE-2026-0859

TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitrary PHP code execution on the web server. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*

History

14 Jan 2026, 18:57

Type Values Removed Values Added
CPE cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
First Time Typo3 typo3
Typo3
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f - () https://github.com/TYPO3/typo3/commit/3225d705080a1bde57a66689621c947da5a4782f - Patch
References () https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13 - () https://github.com/TYPO3/typo3/commit/722bf71c118b0a8e4f2c2494854437d846799a13 - Patch
References () https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f - () https://github.com/TYPO3/typo3/commit/e0f0ceee480c203fbb60b87454f5f193e541d27f - Patch
References () https://typo3.org/security/advisory/typo3-core-sa-2026-004 - () https://typo3.org/security/advisory/typo3-core-sa-2026-004 - Vendor Advisory

13 Jan 2026, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 12:15

Updated : 2026-01-14 18:57


NVD link : CVE-2026-0859

Mitre link : CVE-2026-0859

CVE.ORG link : CVE-2026-0859


JSON object : View

Products Affected

typo3

  • typo3
CWE
CWE-502

Deserialization of Untrusted Data