The following table lists the changes that have been made to the
CVE-2024-55891 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jan. 14, 2025
Action Type Old Value New Value Added Description TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability. Added CVSS V3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N Added CWE CWE-532 Added Reference https://github.com/TYPO3/typo3/security/advisories/GHSA-38×7-cc6w-j27q Added Reference https://typo3.org/security/advisory/typo3-core-sa-2025-001