{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T09:04:53.581","vulnerabilities":[{"cve":{"id":"CVE-2022-31050","sourceIdentifier":"security-advisories@github.com","published":"2022-06-14T21:15:16.247","lastModified":"2024-11-21T07:03:47.317","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem."},{"lang":"es","value":"TYPO3 es un sistema de administración de contenidos web de código abierto. En versiones anteriores a 9.5.34 ELTS, 10.4.29 y 11.5.11, las sesiones de la herramienta de administración iniciadas por medio de la interfaz de usuario del backend de TYPO3 no son revocadas aunque la cuenta de usuario correspondiente es degradado a permisos inferiores o es deshabilitado por completo. De esta manera, las sesiones en la herramienta de administración teóricamente podrían haberse prolongado sin ningún límite. TYPO3 versiones 9.5.34 ELTS, 10.4.29 y 11.5.11 contienen una corrección del problema"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.5.35","matchCriteriaId":"83732441-A020-4401-A274-067B95354BB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.29","matchCriteriaId":"272C6A8B-94DB-4A74-BB3A-24CD0486DFA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.11","matchCriteriaId":"772D645D-5158-416C-BF2C-74E5E43EF1DC"}]}]}],"references":[{"url":"https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2022-005","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2022-005","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}