CVE-2026-6553

| EUVD-2026-24081 HIGH
Cleartext Storage of Sensitive Information (CWE-312)
2026-04-21 TYPO3
7.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

3
Re-analysis Queued
Apr 21, 2026 - 16:22 vuln.today
cvss_changed
Analysis Generated
Apr 21, 2026 - 10:27 vuln.today
CVSS changed
Apr 21, 2026 - 10:22 NVD
7.3 (HIGH)

DescriptionNVD

Changing backend users' passwords via the user settings module results in storing the cleartext password in the uc and user_settings fields of the be_users database table. This issue affects TYPO3 CMS version 14.2.0.

AnalysisAI

TYPO3 CMS 14.2.0 stores backend user passwords in cleartext within database fields (uc, user_settings) when passwords are changed through the user settings module. Remote attackers with database read access or exploiting SQL injection vulnerabilities can retrieve plaintext credentials for backend administrator accounts. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Verify TYPO3 CMS version in production and identify any instances running 14.2.0. Within 7 days: Apply vendor patch (GitHub commit 9a6e913f) to all affected TYPO3 CMS 14.2.0 installations; reset all backend user passwords post-patch and audit database access logs for unauthorized queries. …

Sign in for detailed remediation steps.

Share

CVE-2026-6553 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy