CVE-2022-36104: CWE-770: Allocation of Resources Without Limits or Throttling in TYPO3 typo3
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. Users are advised to update to TYPO3 version 11.5.16 to resolve this issue. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-36104 is a vulnerability identified in TYPO3, an open-source PHP-based web content management system widely used for building and managing websites. The affected TYPO3 versions are from 11.4.0 up to but not including 11.5.16. The vulnerability arises when an attacker sends HTTP requests for invalid or non-existing resources. Instead of simply returning an error, TYPO3's page error handler attempts to retrieve content from another page to display as the error message. This behavior can cause the application to recursively call itself repeatedly, leading to an amplification effect. Each recursive call consumes additional server resources, such as CPU, memory, and web server connections, without any throttling or limits in place (CWE-770: Allocation of Resources Without Limits or Throttling). This can exhaust the web server's capacity, resulting in denial of service (DoS) conditions where legitimate users cannot access the website or application. The vulnerability does not require authentication or user interaction beyond sending crafted HTTP requests. No known exploits have been observed in the wild, but the issue is resolved by upgrading to TYPO3 version 11.5.16 or later. There are no effective workarounds available, making patching the primary remediation method.
Potential Impact
For European organizations using TYPO3 versions between 11.4.0 and 11.5.15, this vulnerability poses a risk of denial of service attacks that can disrupt web services. TYPO3 is popular among government agencies, educational institutions, and medium to large enterprises in Europe, which rely on web availability for public communication and service delivery. An attacker exploiting this vulnerability could cause service outages, impacting business continuity, customer trust, and potentially leading to financial losses. Since the vulnerability can be triggered remotely without authentication, it increases the attack surface and risk of automated or large-scale attacks. The recursive resource consumption could also strain hosting infrastructure, leading to collateral impacts on other hosted services. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can be significant, especially for critical public-facing websites. Organizations with limited incident response or patch management capabilities may face prolonged downtime.
Mitigation Recommendations
1. Immediate upgrade to TYPO3 version 11.5.16 or later is the most effective mitigation to eliminate the vulnerability. 2. Implement web server-level request rate limiting and connection throttling to reduce the impact of recursive requests, for example using Apache mod_reqtimeout or Nginx limit_req modules. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block recursive or anomalous request patterns targeting invalid resources. 4. Monitor web server logs for unusual spikes in 404 or error page requests that may indicate exploitation attempts. 5. Isolate TYPO3 instances in segmented network zones to limit potential impact on other services. 6. Regularly review and update incident response plans to include handling of DoS scenarios caused by application-level resource exhaustion. 7. Engage with TYPO3 community and security advisories to stay informed about patches and emerging threats related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Denmark, Austria, Switzerland, Poland
CVE-2022-36104: CWE-770: Allocation of Resources Without Limits or Throttling in TYPO3 typo3
Description
TYPO3 is an open source PHP based web content management system released under the GNU GPL. In affected versions requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. Users are advised to update to TYPO3 version 11.5.16 to resolve this issue. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36104 is a vulnerability identified in TYPO3, an open-source PHP-based web content management system widely used for building and managing websites. The affected TYPO3 versions are from 11.4.0 up to but not including 11.5.16. The vulnerability arises when an attacker sends HTTP requests for invalid or non-existing resources. Instead of simply returning an error, TYPO3's page error handler attempts to retrieve content from another page to display as the error message. This behavior can cause the application to recursively call itself repeatedly, leading to an amplification effect. Each recursive call consumes additional server resources, such as CPU, memory, and web server connections, without any throttling or limits in place (CWE-770: Allocation of Resources Without Limits or Throttling). This can exhaust the web server's capacity, resulting in denial of service (DoS) conditions where legitimate users cannot access the website or application. The vulnerability does not require authentication or user interaction beyond sending crafted HTTP requests. No known exploits have been observed in the wild, but the issue is resolved by upgrading to TYPO3 version 11.5.16 or later. There are no effective workarounds available, making patching the primary remediation method.
Potential Impact
For European organizations using TYPO3 versions between 11.4.0 and 11.5.15, this vulnerability poses a risk of denial of service attacks that can disrupt web services. TYPO3 is popular among government agencies, educational institutions, and medium to large enterprises in Europe, which rely on web availability for public communication and service delivery. An attacker exploiting this vulnerability could cause service outages, impacting business continuity, customer trust, and potentially leading to financial losses. Since the vulnerability can be triggered remotely without authentication, it increases the attack surface and risk of automated or large-scale attacks. The recursive resource consumption could also strain hosting infrastructure, leading to collateral impacts on other hosted services. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can be significant, especially for critical public-facing websites. Organizations with limited incident response or patch management capabilities may face prolonged downtime.
Mitigation Recommendations
1. Immediate upgrade to TYPO3 version 11.5.16 or later is the most effective mitigation to eliminate the vulnerability. 2. Implement web server-level request rate limiting and connection throttling to reduce the impact of recursive requests, for example using Apache mod_reqtimeout or Nginx limit_req modules. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block recursive or anomalous request patterns targeting invalid resources. 4. Monitor web server logs for unusual spikes in 404 or error page requests that may indicate exploitation attempts. 5. Isolate TYPO3 instances in segmented network zones to limit potential impact on other services. 6. Regularly review and update incident response plans to include handling of DoS scenarios caused by application-level resource exhaustion. 7. Engage with TYPO3 community and security advisories to stay informed about patches and emerging threats related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3e3a
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 9:51:31 PM
Last updated: 10/16/2025, 7:38:20 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55090: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumCVE-2025-62585: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-62584: CWE-346 Origin Validation Error in NAVER NAVER Whale browser
UnknownCVE-2025-62583: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-10850: CWE-798 Use of Hard-coded Credentials in RiceTheme Felan Framework
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.