{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T14:19:23.686","vulnerabilities":[{"cve":{"id":"CVE-2023-38499","sourceIdentifier":"security-advisories@github.com","published":"2023-07-25T21:15:10.997","lastModified":"2024-11-21T08:13:42.133","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem."},{"lang":"es","value":"TYPO3 es un sistema de gestión de contenidos web de código abierto basado en PHP. A partir de la versión 9.4.0 y antes de las versiones 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, y 12.4.4 en escenarios multi-sitio, la enumeración de los parámetros de consulta HTTP \"id\" y \"L\" permitía el acceso fuera del alcance al contenido renderizado en el frontend del sitio web. Por ejemplo, esto permitía a los visitantes acceder al contenido de un sitio interno añadiendo parámetros de consulta manuales a la URL de un sitio que estaba disponible públicamente. Las versiones de TYPO3 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30 y 12.4.4 corrigen el problema. "}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"9.4.0","versionEndExcluding":"9.5.42","matchCriteriaId":"F977D03B-2605-4DDA-8E08-9E32862B36FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.39","matchCriteriaId":"4FD93DD8-F62F-4541-8B1E-0B78A069A9BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.30","matchCriteriaId":"6CA1BEF0-8CBD-46AE-A155-A010CCE92F6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.4.4","matchCriteriaId":"AE209B6F-686B-4896-A7E0-B8426A4818C1"}]}]}],"references":[{"url":"https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2023-003","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2023-003","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}