Description
TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitrary PHP code execution on the web server. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
10.0.0 (semver) before 10.4.55
11.0.0 (semver) before 11.5.49
12.0.0 (semver) before 12.4.41
13.0.0 (semver) before 13.4.23
14.0.0 (semver) before 14.0.2
Credits
Vitaly Simonovich
Elias Häußler
Oliver Hader
References
typo3.org/security/advisory/typo3-core-sa-2026-004
github.com/...ommit/3225d705080a1bde57a66689621c947da5a4782f (Git commit of main branch)
github.com/...ommit/e0f0ceee480c203fbb60b87454f5f193e541d27f (Git commit of 13.4 branch)
github.com/...ommit/722bf71c118b0a8e4f2c2494854437d846799a13 (Git commit of 12.4 branch)