{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T02:34:23.334","vulnerabilities":[{"cve":{"id":"CVE-2024-55891","sourceIdentifier":"security-advisories@github.com","published":"2025-01-14T20:15:28.773","lastModified":"2025-08-26T18:52:53.197","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability."},{"lang":"es","value":"TYPO3 es un framework gestor de contenidos gratuito y de código abierto. Se ha descubierto que la contraseña de la herramienta de instalación se ha registrado como texto plano en caso de que el mecanismo de hash de contraseñas utilizado para la contraseña fuera incorrecto. Se recomienda a los usuarios que actualicen a la versión 13.4.3 ELTS de TYPO3, que soluciona el problema descrito. No se conocen Workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:13.4.2:*:*:*:*:*:*:*","matchCriteriaId":"09A70D70-411F-43B2-B7F8-5690096859E6"}]}]}],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-38x7-cc6w-j27q","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2025-001","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}