The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
CVSS
No CVSS.
References
Configurations
No configuration.
History
17 Mar 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 09:16
Updated : 2026-03-17 14:20
NVD link : CVE-2026-1323
Mitre link : CVE-2026-1323
CVE.ORG link : CVE-2026-1323
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data
