CVE-2026-1323

The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
CVSS

No CVSS.

Configurations

No configuration.

History

17 Mar 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-17 09:16

Updated : 2026-03-17 14:20


NVD link : CVE-2026-1323

Mitre link : CVE-2026-1323

CVE.ORG link : CVE-2026-1323


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data