TYPO3's mail‑file spool deserialization flaw lets local users with write access to the spool directory craft a malicious file that is deserialized during the mailer:spool:send command, enabling arbitrary PHP code execution on the web server. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.
2026-01-13T12:15:50.383
2026-01-14T18:57:50.443
Analyzed
f4fb688c-4412-4426-b4b8-421ecf27b14a
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | typo3 | typo3 | < 10.4.55 | Yes |
| Application | typo3 | typo3 | < 11.5.49 | Yes |
| Application | typo3 | typo3 | < 12.4.41 | Yes |
| Application | typo3 | typo3 | < 13.4.23 | Yes |
| Application | typo3 | typo3 | < 14.0.2 | Yes |