Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34537: n/a

0
Medium
VulnerabilityCVE-2024-34537cvecve-2024-34537
Published: Mon Oct 28 2024 (10/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TYPO3 before 13.3.1 allows denial of service (interface error) in the Bookmark Toolbar (ext:backend), exploitable by an administrator-level backend user account via manipulated data saved in the bookmark toolbar of the backend user interface. The fixed versions are 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, and 13.3.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:14:41 UTC

Technical Analysis

CVE-2024-34537 is a vulnerability in the TYPO3 content management system affecting versions before 13.3.1, specifically within the Bookmark Toolbar feature of the backend user interface (ext:backend). This flaw allows an authenticated administrator-level user to trigger a denial of service (DoS) condition by saving specially crafted, manipulated data in the bookmark toolbar. The vulnerability manifests as an interface error that disrupts the normal operation of the backend UI, effectively causing a DoS that impacts availability. The vulnerability does not compromise confidentiality or integrity, as it does not allow data leakage or unauthorized data modification. Exploitation requires high privileges (administrator backend access), no additional user interaction, and can be performed remotely over the network (AV:N). The attack complexity is low (AC:L), meaning it is straightforward for an attacker with the required privileges to exploit. TYPO3 has addressed this issue in versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, and 13.3.1, and users are strongly advised to upgrade to these or later versions. There are no known public exploits or active exploitation campaigns reported at this time.

Potential Impact

The primary impact of CVE-2024-34537 is a denial of service condition affecting the availability of the TYPO3 backend interface, specifically the bookmark toolbar functionality. For organizations relying on TYPO3 CMS for website management, this could temporarily disrupt administrative operations, delaying content updates or configuration changes. Since exploitation requires administrator-level access, the threat is limited to insiders or attackers who have already compromised an admin account. However, if an attacker gains such access, they could leverage this vulnerability to degrade service and potentially cause operational disruptions. The vulnerability does not expose sensitive data or allow unauthorized data modification, limiting its impact to availability. Organizations with large TYPO3 deployments or critical web infrastructure managed via TYPO3 could face operational downtime or increased administrative overhead during incident response. The absence of known exploits reduces immediate risk but does not eliminate the need for timely patching.

Mitigation Recommendations

To mitigate CVE-2024-34537, organizations should promptly upgrade TYPO3 CMS installations to the fixed versions: 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, or 13.3.1 and later. Restrict administrator backend access to trusted personnel and enforce strong authentication mechanisms to reduce the risk of account compromise. Implement monitoring and alerting on backend user activities to detect unusual bookmark toolbar modifications or other suspicious behavior. Regularly audit administrator accounts and permissions to ensure only necessary privileges are granted. Consider network segmentation and access controls to limit backend interface exposure to trusted networks. In environments where immediate patching is not feasible, temporarily disabling or restricting the bookmark toolbar feature could reduce exposure. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents. Finally, stay informed on TYPO3 security advisories for any updates or emerging threats related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c53b7ef31ef0b562bd8

Added to database: 2/25/2026, 9:40:35 PM

Last enriched: 2/28/2026, 3:14:41 AM

Last updated: 4/12/2026, 1:56:27 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses