CVE-2026-0895

Zombie Code: When Copy-Pasted Vulnerabilities Come Back to Haunt TYPO3

Alon Barad
Alon Barad
Software Engineer

Jan 21, 2026·5 min read·5 visits

Executive Summary (TL;DR)

The 'Mailqueue' extension for TYPO3 uses an outdated, custom implementation of the system's file spooler. It blindly passes file contents to PHP's `unserialize()` function. If an attacker can write a file to the spool directory (via a separate vulnerability or low-privileged access), they can trigger RCE when the mailer task runs.

A classic case of 'copypasta' security debt. The TYPO3 Mailqueue extension duplicated a core component that contained a deserialization flaw. When the core was patched, the extension remained vulnerable, allowing attackers with filesystem access to achieve Remote Code Execution (RCE) via serialized email objects.

Fix Analysis (2)

Technical Appendix

CVSS Score
5.2/ 10
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H
EPSS Probability
0.02%
Top 97% most exploited

Affected Systems

TYPO3 CMS with Mailqueue extension < 0.4.3TYPO3 CMS with Mailqueue extension 0.5.0

Affected Versions Detail

Product
Affected Versions
Fixed Version
cpsit/typo3-mailqueue
CPS-IT
< 0.4.30.4.3
cpsit/typo3-mailqueue
CPS-IT
0.5.00.5.1
AttributeDetail
CWECWE-502 (Insecure Deserialization)
CVSS v4.05.2 (Medium)
Attack VectorLocal (File Write Required)
Exploit StatusPoC Available (via generic chains)
PatchYes (v0.5.1)
EPSS0.00017 (Low)
CWE-502
Deserialization of Untrusted Data

The application deserializes untrusted data without sufficiently verifying the resulting data will be valid.

Vulnerability Timeline

Advisory Published
2026-02-18
Patch Released on GitHub
2026-02-15