{"id":"CVE-2022-31048","summary":"Cross-Site Scripting in Form Framework","details":"TYPO3 is an open source web content management system. Prior to versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. TYPO3 versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.","aliases":["BIT-typo3-2022-31048","GHSA-3r95-23jp-mhvg"],"modified":"2026-04-26T04:11:20.980925Z","published":"2022-06-14T20:50:18Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-79"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31048.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31048.json"},{"type":"ADVISORY","url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31048"},{"type":"ADVISORY","url":"https://typo3.org/security/advisory/typo3-core-sa-2022-003"},{"type":"FIX","url":"https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/TYPO3/typo3","events":[{"introduced":"c91b70e450c52d29ffb08115fffbb7832b15a330"},{"fixed":"e87db3fd3ffbc41e2fc848d5295962d8c6d6d2d1"},{"introduced":"6a5e2d4097ef0a0e3ea955af93cf83810d6fa234"},{"fixed":"7396e8fe588a8690293d79318e7048bfb11ad8ca"}],"database_specific":{"cpe":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"10.0.0"},{"fixed":"10.4.29"},{"introduced":"11.0.0"},{"fixed":"11.5.11"}],"source":"CPE_FIELD"}}],"versions":["v10.0.0","v10.1.0","v10.2.0","v10.3.0","v10.4.0","v10.4.1","v10.4.10","v10.4.11","v10.4.12","v10.4.13","v10.4.14","v10.4.15","v10.4.16","v10.4.17","v10.4.18","v10.4.19","v10.4.2","v10.4.20","v10.4.21","v10.4.22","v10.4.23","v10.4.24","v10.4.25","v10.4.26","v10.4.27","v10.4.28","v10.4.3","v10.4.4","v10.4.5","v10.4.6","v10.4.7","v10.4.8","v10.4.9","v11.0.0","v11.1.0","v11.2.0","v11.3.0","v11.4.0","v11.5.0","v11.5.1","v11.5.10","v11.5.2","v11.5.3","v11.5.4","v11.5.5","v11.5.6","v11.5.7","v11.5.8","v11.5.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31048.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/typo3/typo3","events":[{"introduced":"0"},{"fixed":"6f2554dc4ea0b670fd5599c54fd788d4db96c4a0"}],"database_specific":{"source":"REFERENCES"}}],"versions":["6.2.0","6.2.1","6.2.2","6.2.3","7.0.0","7.1.0","7.2.0","7.3.0","7.4.0","7.5.0","7.6.0","7.6.1","7.6.2","8.0.0","8.1.0","8.2.0","8.3.0","8.4.0","8.5.0","8.6.0","8.7.0","TYPO3_6-1-0rc1","TYPO3_6-2-0","TYPO3_6-2-0alpha1","TYPO3_6-2-0alpha2","TYPO3_6-2-0alpha3","TYPO3_6-2-0beta1","TYPO3_6-2-0beta2","TYPO3_6-2-0beta3","TYPO3_6-2-0beta4","TYPO3_6-2-0beta5","TYPO3_6-2-0beta6","TYPO3_6-2-0beta7","TYPO3_6-2-0rc1","TYPO3_6-2-0rc2","TYPO3_6-2-1","TYPO3_6-2-2","TYPO3_6-2-3","TYPO3_7-0-0","TYPO3_7-1-0","TYPO3_7-2-0","TYPO3_7-3-0","TYPO3_7-4-0","TYPO3_7-5-0","TYPO3_7-6-0","TYPO3_7-6-1","TYPO3_7-6-2","TYPO3_8-0-0","TYPO3_8-1-0","TYPO3_8-2-0","TYPO3_8-3-0","TYPO3_8-4-0","TYPO3_8-5-0","TYPO3_8-6-0","TYPO3_8-7-0","v10.0.0","v10.1.0","v10.2.0","v10.3.0","v10.4.0","v10.4.1","v10.4.2","v10.4.3","v11.0.0","v11.1.0","v11.2.0","v11.3.0","v11.4.0","v11.5.0","v11.5.1","v11.5.2","v11.5.3","v9.0.0","v9.1.0","v9.2.0","v9.3.0","v9.4.0","v9.5.0","v9.5.1","v9.5.2","v9.5.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31048.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}