CVE-2026-0859Deserialization of Untrusted Data in CMS

Severity
5.2MEDIUMNVD
EPSS
0.0%
top 88.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13

Description

TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitrary PHP code execution on the web server. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H

Affected Packages3 packages

NVDtypo3/typo310.0.010.4.55+4
Packagisttypo3/cms-core14.0.014.0.2+4
CVEListV5typo3/typo3_cms10.0.010.4.55+4

Patches

🔴Vulnerability Details

3
GHSA
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool2026-01-13
OSV
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool2026-01-13
CVEList
TYPO3 CMS Allows Insecure Deserialization via Mailer File Spool2026-01-13

🕵️Threat Intelligence

1
Wiz
CVE-2026-0859 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-0859 — Deserialization of Untrusted Data | cvebase