{"id":"CVE-2020-11067","details":"In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that backend user settings (in $BE_USER-\u003euc) are vulnerable to insecure deserialization. In combination with vulnerabilities of third party components, this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2.","aliases":["BIT-typo3-2020-11067","GHSA-2wj9-434x-9hvp"],"modified":"2026-03-13T22:16:10.788769Z","published":"2020-05-14T00:15:11.400Z","related":["GHSA-2wj9-434x-9hvp"],"references":[{"type":"ADVISORY","url":"https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2wj9-434x-9hvp"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/typo3/typo3.cms","events":[{"introduced":"41235ff8e38c6f3401df03ae8beddd62d662c525"},{"last_affected":"1fc9f156fa3783e1f3327afa2ec772b8253c379f"},{"introduced":"c91b70e450c52d29ffb08115fffbb7832b15a330"},{"last_affected":"d54b7fc011b9b9d4ecea8196b59fe919c2c09406"}],"database_specific":{"versions":[{"introduced":"9.0.0"},{"last_affected":"9.5.16"},{"introduced":"10.0.0"},{"last_affected":"10.4.1"}]}}],"versions":["v10.0.0","v10.1.0","v10.2.0","v10.3.0","v10.4.0","v10.4.1","v9.0.0","v9.1.0","v9.2.0","v9.3.0","v9.4.0","v9.5.0","v9.5.1","v9.5.10","v9.5.11","v9.5.12","v9.5.13","v9.5.14","v9.5.15","v9.5.16","v9.5.2","v9.5.3","v9.5.4","v9.5.5","v9.5.6","v9.5.7","v9.5.8","v9.5.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11067.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}