Skip to main content

CVE-2022-47410: n/a in n/a

Medium
VulnerabilityCVE-2022-47410cvecve-2022-47410n-acwe-200
Published: Wed Dec 14 2022 (12/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via createAction operations.

AI-Powered Analysis

AILast updated: 06/21/2025, 15:09:04 UTC

Technical Analysis

CVE-2022-47410 is a medium-severity vulnerability affecting multiple versions of the fp_newsletter extension for TYPO3, a widely used open-source content management system. The fp_newsletter extension manages newsletter subscriber data. The vulnerability arises from improper access control in the createAction operations, which allows unauthorized users to obtain subscriber data. This is classified under CWE-200, indicating an information exposure issue. Specifically, the flaw permits attackers to retrieve sensitive subscriber information without proper authorization, potentially including email addresses and other personal data collected by the newsletter system. The affected versions span multiple branches of the extension prior to versions 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6. No public exploits are currently known in the wild, and no official patches or vendor advisories are linked in the provided data. The vulnerability does not require authentication or user interaction, increasing its risk profile. TYPO3 is commonly used by European organizations, especially in government, education, and medium-sized enterprises, making this vulnerability relevant to these sectors. The exposure of subscriber data can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential phishing or social engineering attacks leveraging the leaked information.

Potential Impact

For European organizations, the impact of CVE-2022-47410 is primarily on confidentiality and privacy. The unauthorized disclosure of subscriber data can violate GDPR and other data protection regulations, leading to legal penalties and reputational damage. Organizations relying on TYPO3 with the vulnerable fp_newsletter extension risk exposing personal subscriber information, which can be exploited for targeted phishing campaigns or identity theft. While the vulnerability does not directly affect system integrity or availability, the loss of trust and potential regulatory fines can have significant operational and financial consequences. Sectors such as public administration, education, and non-profits, which often use TYPO3 for their websites and communications, are particularly at risk. Additionally, the lack of authentication requirement means attackers can exploit this vulnerability remotely without credentials, increasing the likelihood of exploitation if unpatched.

Mitigation Recommendations

1. Immediate upgrade of the fp_newsletter extension to the latest patched versions (1.1.1, 1.2.0, 2.1.2, 2.4.1, or 3.2.6 and above) as soon as they become available. 2. In the absence of patches, restrict access to the createAction endpoints by implementing web application firewall (WAF) rules that limit access to trusted IP addresses or require authentication. 3. Audit and monitor web server logs for unusual access patterns to the newsletter subscriber management functions. 4. Implement strict role-based access control (RBAC) within TYPO3 to ensure only authorized personnel can access subscriber data. 5. Conduct a data privacy impact assessment (DPIA) to identify and mitigate risks related to subscriber data exposure. 6. Inform subscribers about the potential data exposure and advise on phishing awareness. 7. Regularly review and update TYPO3 and its extensions to maintain security hygiene. 8. Employ network segmentation to isolate the TYPO3 CMS environment from critical internal systems to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-12-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7a1f

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 3:09:04 PM

Last updated: 7/21/2025, 11:16:17 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats