CVE-2023-47125

Source
https://cve.org/CVERecord?id=CVE-2023-47125
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47125.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-47125
Aliases
Published
2023-11-14T20:07:56.433Z
Modified
2026-02-26T08:49:25.193229Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
By-passing Cross-Site Scripting Protection in HTML Sanitizer
Details

TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions DOM processing instructions are not handled correctly. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer. This vulnerability has been addressed in versions 1.5.3 and 2.1.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/47xxx/CVE-2023-47125.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/typo3/html-sanitizer

Affected ranges

Type
GIT
Repo
https://github.com/typo3/html-sanitizer
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.0.0"
        },
        {
            "fixed": "1.5.3"
        }
    ]
}
Type
GIT
Repo
https://github.com/typo3/html-sanitizer
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.1.4"
        }
    ]
}

Affected versions

v2.*
v2.0.0
v2.0.1
v2.0.10
v2.0.11
v2.0.12
v2.0.13
v2.0.14
v2.0.15
v2.0.16
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.1.1
v2.1.2
v2.1.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47125.json"

Git / github.com/typo3/typo3.cms

Affected versions

v12.*
v12.0.0
v12.1.0
v12.2.0
v12.3.0
v12.4.0
v12.4.1
v12.4.2
v12.4.3
v12.4.4
v12.4.5
v12.4.6
v12.4.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47125.json"