From 8cd26ca3257bd3badb038748a94c8be5e11b15bb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Elias=20H=C3=A4u=C3=9Fler?= Date: Wed, 20 May 2026 08:30:22 +0200 Subject: [PATCH] Improve GHSA-v348-vr4q-fv9p --- .../GHSA-v348-vr4q-fv9p.json | 50 +++++++++++++++++-- 1 file changed, 47 insertions(+), 3 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-v348-vr4q-fv9p/GHSA-v348-vr4q-fv9p.json b/advisories/unreviewed/2026/05/GHSA-v348-vr4q-fv9p/GHSA-v348-vr4q-fv9p.json index 61831b16d6e8b..70ccf5ad32a77 100644 --- a/advisories/unreviewed/2026/05/GHSA-v348-vr4q-fv9p/GHSA-v348-vr4q-fv9p.json +++ b/advisories/unreviewed/2026/05/GHSA-v348-vr4q-fv9p/GHSA-v348-vr4q-fv9p.json @@ -1,24 +1,68 @@ { "schema_version": "1.4.0", "id": "GHSA-v348-vr4q-fv9p", - "modified": "2026-05-19T12:31:39Z", + "modified": "2026-05-19T12:31:40Z", "published": "2026-05-19T12:31:39Z", "aliases": [ "CVE-2026-46721" ], + "summary": "TYPO3 extension \"sf_register\" affected by Broken Access Control", "details": "The create and edit flows do not restrict which user properties may be submitted and do not enforce access control on the frontend user group assignment. As a result, an attacker can assign an arbitrary frontend user group to a newly registered or edited account, gaining unauthorized access to content and functionality restricted to privileged frontend user groups.", "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "evoweb/sf-register" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "14.0.0" + }, + { + "fixed": "14.0.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "evoweb/sf-register" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "13.2.4" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-46721" }, + { + "type": "PACKAGE", + "url": "https://github.com/evoWeb/sf_register" + }, { "type": "WEB", "url": "https://typo3.org/security/advisory/typo3-ext-sa-2026-009"