Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22188: n/a

0
High
VulnerabilityCVE-2024-22188cvecve-2024-22188
Published: Tue Mar 05 2024 (03/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TYPO3 before 13.0.1 allows an authenticated admin user (with system maintainer privileges) to execute arbitrary shell commands (with the privileges of the web server) via a command injection vulnerability in form fields of the Install Tool. The fixed versions are 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, and 13.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:05:56 UTC

Technical Analysis

CVE-2024-22188 is a command injection vulnerability affecting TYPO3 CMS, a widely used open-source content management system. The flaw exists in the Install Tool component's form fields, where input is not properly sanitized, allowing an authenticated administrator with system maintainer privileges to inject and execute arbitrary shell commands on the underlying server. This vulnerability is classified under CWE-94 (Improper Control of Generation of Code). The commands execute with the privileges of the web server user, which can lead to full system compromise, including data theft, service disruption, or further lateral movement within the network. The vulnerability affects multiple TYPO3 versions before 13.0.1, including several Extended Long Term Support (ELTS) and Long Term Support (LTS) releases, indicating a broad impact across different TYPO3 deployments. The CVSS v3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges (high), no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires authenticated access with high privileges, the ability to execute arbitrary shell commands makes this vulnerability particularly dangerous. TYPO3 has released fixed versions addressing this issue, and organizations are strongly advised to upgrade to these patched versions to mitigate the risk.

Potential Impact

The impact of CVE-2024-22188 is significant for organizations using TYPO3 CMS, especially those with publicly accessible administrative interfaces. Successful exploitation allows attackers with admin-level access to execute arbitrary commands on the server, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, defacement or destruction of website content, installation of backdoors or malware, and disruption of services. Since the commands run with web server privileges, attackers may escalate privileges further depending on server configuration. The vulnerability's exploitation could also facilitate lateral movement within the network, increasing the risk to connected systems. Organizations relying on TYPO3 for critical web infrastructure or sensitive data hosting face increased risk of reputational damage, regulatory penalties, and operational downtime if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-22188, organizations should immediately upgrade TYPO3 installations to the fixed versions: 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS, or 13.0.1 and later. Restrict access to the Install Tool and administrative interfaces using network-level controls such as VPNs, IP whitelisting, or firewalls to limit exposure. Enforce strong authentication and authorization policies to ensure only trusted administrators have system maintainer privileges. Regularly audit user accounts and privileges to minimize the number of users with high-level access. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns targeting TYPO3. Monitor server and application logs for unusual command execution or access patterns indicative of exploitation attempts. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous activities. Finally, conduct regular security assessments and penetration tests focusing on administrative interfaces to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d49b7ef31ef0b570026

Added to database: 2/25/2026, 9:44:41 PM

Last enriched: 2/26/2026, 10:05:56 AM

Last updated: 4/12/2026, 5:08:31 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses