| 概要 | The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings. |
|---|---|
| 公表日 | 2026年5月19日19:16 |
| 登録日 | 2026年5月20日4:12 |
| 最終更新日 | 2026年5月19日23:47 |