Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0895: CWE-502 Deserialization of Untrusted Data in TYPO3 Extension "Mailqueue"

0
Medium
VulnerabilityCVE-2026-0895cvecve-2026-0895cwe-502
Published: Tue Jan 20 2026 (01/20/2026, 07:19:00 UTC)
Source: CVE Database V5
Vendor/Project: TYPO3
Product: Extension "Mailqueue"

Description

CVE-2026-0895 is a medium severity vulnerability affecting the TYPO3 CMS extension "Mailqueue" versions up to 0. 5. 0. It involves insecure deserialization of untrusted data (CWE-502) due to the extension overwriting a prior core fix, reintroducing vulnerable code extracted from TYPO3 core. This flaw allows an attacker with low privileges and partial authentication to exploit the vulnerability locally, potentially impacting confidentiality and integrity without requiring user interaction. Although no known exploits are currently in the wild, the vulnerability poses a risk to TYPO3 installations using this extension, especially in environments with high security requirements. European organizations using TYPO3 with the Mailqueue extension should prioritize patching or removing the extension to mitigate risk. Countries with significant TYPO3 adoption and critical infrastructure relying on TYPO3 CMS are most likely to be affected. The vulnerability’s medium severity reflects the limited attack vector and required privileges but acknowledges the potential for serious impact if exploited.

AI-Powered Analysis

AILast updated: 01/20/2026, 07:50:13 UTC

Technical Analysis

CVE-2026-0895 concerns an insecure deserialization vulnerability (CWE-502) in the TYPO3 CMS extension "Mailqueue" (versions 0 to 0.5.0). TYPO3’s FileSpool component was previously vulnerable to insecure deserialization, which was addressed in TYPO3 core via advisory TYPO3-CORE-SA-2026-004. However, the Mailqueue extension overwrites this core fix by reintroducing the vulnerable code that was extracted from the core into the extension itself. This means that even if the TYPO3 core is patched, the presence of the vulnerable Mailqueue extension allows an attacker to exploit insecure deserialization. The vulnerability allows an attacker with low privileges and partial authentication (PR:L, AT:P) to execute malicious deserialization locally (AV:L), without requiring user interaction (UI:N). The vulnerability impacts confidentiality and integrity (VC:N, VI:L), but not availability. The scope is high (SC:H) and the impact is significant (SI:H, SA:H) because the vulnerability affects a component critical to mail queue processing, potentially allowing manipulation of serialized data leading to code execution or data tampering. No public exploits are known yet, but the vulnerability is published and should be addressed promptly.

Potential Impact

For European organizations using TYPO3 CMS with the Mailqueue extension, this vulnerability poses a risk of unauthorized code execution or data manipulation via insecure deserialization. This can lead to compromise of sensitive data, unauthorized access to internal systems, and potential disruption of email processing workflows. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on TYPO3 for web content management are particularly at risk. The requirement for low privileges and partial authentication reduces the attack complexity but limits remote exploitation, meaning insider threats or compromised accounts could be leveraged. The vulnerability could also be used as a foothold for lateral movement within networks. The impact on confidentiality and integrity is medium to high, potentially leading to data breaches or defacement of websites. Given TYPO3’s popularity in Europe, especially in Germany, the Netherlands, and Austria, the threat is relevant for many European entities.

Mitigation Recommendations

1. Immediately audit TYPO3 installations to identify the presence of the Mailqueue extension, especially versions 0 through 0.5.0. 2. Remove or disable the Mailqueue extension if it is not essential. 3. If the extension is required, check for any updated versions or patches from the extension maintainers that address this vulnerability. 4. Apply the TYPO3 core security update TYPO3-CORE-SA-2026-004 and ensure no overrides by extensions reintroduce vulnerable code. 5. Implement strict access controls to limit who can authenticate and access TYPO3 backend or related services. 6. Monitor logs for suspicious deserialization attempts or unusual activity related to mail queue processing. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting deserialization attacks. 8. Educate administrators about the risks of insecure deserialization and the importance of extension management. 9. Regularly review and update all TYPO3 extensions to avoid similar issues caused by outdated or unmaintained code.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TYPO3
Date Reserved
2026-01-13T15:24:31.992Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f305c4623b1157c1fe251

Added to database: 1/20/2026, 7:35:56 AM

Last enriched: 1/20/2026, 7:50:13 AM

Last updated: 1/20/2026, 3:17:17 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats