The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description The extension passes an attacker-controlled cookie directly to PHP's unserialize() without safely processing the input. A remote, unauthenticated attacker can supply a crafted serialized payload to trigger PHP Object Injection, leading to Remote Code Execution on the TYPO3 server. Exploitation requires the content element to be configured with "Persistent Mode: Static" in the plugin settings.
Title Remote Code Execution in extension "Content Element Selector" (ceselector)
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TYPO3

Published:

Updated: 2026-05-19T09:25:33.489Z

Reserved: 2026-05-16T09:55:27.478Z

Link: CVE-2026-46725

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T10:16:25.457

Modified: 2026-05-19T10:16:25.457

Link: CVE-2026-46725

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses