Description
The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
6.0.0 (semver) before 6.0.1
5.0.0 (semver) before 5.0.1
4.0.0 (semver) before 4.0.2
Any version before 3.0.3
Credits
Torben Hansen
Matthias Mächler
References
typo3.org/security/advisory/typo3-ext-sa-2026-013