| Summary | The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings. |
|---|---|
| Publication Date | May 19, 2026, 7:16 p.m. |
| Registration Date | May 20, 2026, 4:12 a.m. |
| Last Update | May 19, 2026, 11:47 p.m. |