CVE-2026-0859

7.8 HIGH

📋 TL;DR

This CVE describes a deserialization vulnerability in TYPO3 CMS mail file spool functionality. Local users with write access to the spool directory can craft malicious files that execute arbitrary PHP code when the mailer:spool:send command runs. This affects TYPO3 CMS versions 10.0.0 through 14.0.1.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user with write access to mail spool directory and execution of mailer:spool:send command.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise with arbitrary PHP code execution, leading to data theft, lateral movement, and complete system control.

🟠

Likely Case

Privilege escalation from local user to web server user, enabling website defacement, data manipulation, and further exploitation.

🟢

If Mitigated

Limited impact if proper file permissions restrict spool directory access and monitoring detects suspicious activity.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of spool directory location. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.4.55, 11.5.49, 12.4.41, 13.4.23, 14.0.2

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2026-004

Restart Required: No

Instructions:

1. Backup your TYPO3 installation. 2. Update to patched version via Composer: composer require typo3/cms-core:^10.4.55 (adjust version). 3. Clear caches: ./vendor/bin/typo3 cache:flush. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict spool directory permissions

linux

Change file permissions on mail spool directory to prevent unauthorized write access.

chmod 750 typo3temp/var/spool/
chown www-data:www-data typo3temp/var/spool/

Disable mail spool functionality

all

Configure TYPO3 to use direct mail sending instead of spooling.

Set $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport'] = 'smtp' or 'sendmail' in LocalConfiguration.php

🧯 If You Can't Patch

  • Restrict access to mail spool directory using file system permissions
  • Monitor spool directory for unauthorized file creation

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version: ./vendor/bin/typo3 --version. If version falls within affected ranges, system is vulnerable.

Check Version:

./vendor/bin/typo3 --version

Verify Fix Applied:

Verify version is patched: ./vendor/bin/typo3 --version should show 10.4.55+, 11.5.49+, 12.4.41+, 13.4.23+, or 14.0.2+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual files in typo3temp/var/spool/ directory
  • Errors in TYPO3 logs related to mail spool deserialization
  • Unexpected PHP execution from spool directory

Network Indicators:

  • Outbound connections from web server after mail spool processing

SIEM Query:

source="typo3.log" AND "mailer:spool:send" AND error

🔗 References

📤 Share & Export