The OOXML parsing of the file indexer does not disable external entity resolution. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://typo3.org/security/advisory/typo3-ext-sa-2026-011 |
|
History
Tue, 19 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The OOXML parsing of the file indexer does not disable external entity resolution. A crafted xlsx or pptx document placed in an indexed directory can cause local files to be read or outbound HTTP requests to be performed, with the retrieved content being written to the search index. | |
| Title | XML External Entity Injection in extension "Faceted Search" (ke_search) | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TYPO3
Published:
Updated: 2026-05-19T09:23:02.618Z
Reserved: 2026-05-16T09:55:27.478Z
Link: CVE-2026-46722
No data.
Status : Received
Published: 2026-05-19T10:16:25.027
Modified: 2026-05-19T10:16:25.027
Link: CVE-2026-46722
No data.
OpenCVE Enrichment
Updated: 2026-05-19T11:30:03Z
Weaknesses