CVE-2026-0859

CamelCase Catastrophe: How a Typo in TYPO3 Enabled RCE

Alon Barad
Alon Barad
Software Engineer

Jan 14, 2026·5 min read·8 visits

Executive Summary (TL;DR)

The TYPO3 developers attempted to secure the mail spooler by whitelisting allowed classes during deserialization. However, they used the configuration key 'allowedClasses' (camelCase) instead of the required 'allowed_classes' (snake_case). PHP silently ignored the invalid key, disabling the whitelist entirely. This allows an attacker with write access to the spool directory to execute arbitrary code via gadget chains.

A critical insecure deserialization vulnerability in TYPO3 CMS caused by a typographical error in the unserialize() options. A local attacker can escalate privileges to RCE by planting malicious serialized objects in the mail spool.

Fix Analysis (2)

Technical Appendix

CVSS Score
5.2/ 10
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
EPSS Probability
0.04%
Top 86% most exploited

Affected Systems

TYPO3 CMS 14.0.0 - 14.0.1TYPO3 CMS 13.0.0 - 13.4.22TYPO3 CMS 12.0.0 - 12.4.40TYPO3 CMS 11.0.0 - 11.5.48TYPO3 CMS 10.0.0 - 10.4.54

Affected Versions Detail

Product
Affected Versions
Fixed Version
TYPO3 CMS v14
TYPO3
14.0.0 - 14.0.114.0.2
TYPO3 CMS v13
TYPO3
13.0.0 - 13.4.2213.4.23
TYPO3 CMS v12
TYPO3
12.0.0 - 12.4.4012.4.41
AttributeDetail
CWE IDCWE-502
Attack VectorLocal (File Write)
CVSS5.2 (Medium)
ImpactRemote Code Execution (RCE)
Configurationtransport_spool_type = file
Exploit StatusPoC Available
CWE-502
Deserialization of Untrusted Data

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Vulnerability Timeline

Vulnerability Disclosed & Patched
2026-01-13
CVE Assigned
2026-01-13