CVE-2026-8827 PUBLISHED

SQL Injection in extension "Address List" (tt_address)

Assigner: TYPO3
Reserved: 18.05.2026 Published: 19.05.2026 Updated: 19.05.2026

The AddressRepository::getSqlQuery() method constructs a database query without properly sanitizing user input, leading to SQL Injection. The method is not invoked anywhere within the extension itself and therefore poses no direct risk in a default installation. However, custom extensions that call this method with untrusted input would expose the site to SQL injection.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor TYPO3
Product Extension "Address List"
Versions Default: unaffected
  • affected from 10.0.0 to 10.0.1 (excl.)
  • affected from 9.0.0 to 9.1.1 (excl.)
  • affected from 0 to 8.1.2 (excl.)

Credits

  • Georg Ringer reporter
  • Georg Ringer remediation developer

References

Problem Types

  • CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE