Description
The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version before 0.4.5
0.5.0 (semver) before 0.5.2
Credits
Elias Häußler
Elias Häußler
References
typo3.org/security/advisory/typo3-ext-sa-2026-005