Description
The Crawler extension passes the X-T3Crawler-Meta response header from crawled URLs directly to PHP's unserialize(). An attacker controlling a crawled endpoint can inject arbitrary serialized PHP objects, leading to Remote Code Execution on the TYPO3 server. Exploitation requires administrative privileges to configure a crawler-enabled page and trigger the crawl via a Scheduler task.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
12.0.0 (semver) before 12.0.11
Any version before 11.0.13
Credits
Roman Hergenreder
Tomas Norre Mikkelsen
References
typo3.org/security/advisory/typo3-ext-sa-2026-008