Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-29r8-gvx4-r9w3 | Authentication Bypass in extension "E-Mail MFA Provider" (mfa_email) |
| Link | Providers |
|---|---|
| https://typo3.org/security/advisory/typo3-ext-sa-2026-007 |
|
Sat, 25 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mrsilaz
Mrsilaz mfa Mail |
|
| CPEs | cpe:2.3:a:mrsilaz:mfa_mail:*:*:*:*:*:typo3:*:* cpe:2.3:a:mrsilaz:mfa_mail:2.0.0:*:*:*:*:typo3:*:* |
|
| Vendors & Products |
Mrsilaz
Mrsilaz mfa Mail |
|
| Metrics |
cvssV3_1
|
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Typo3
Typo3 extension "e-mail Mfa Provider" |
|
| Vendors & Products |
Typo3
Typo3 extension "e-mail Mfa Provider" |
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider. | |
| Title | Authentication Bypass in extension "E-Mail MFA Provider" (mfa_email) | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TYPO3
Published:
Updated: 2026-03-24T17:20:39.697Z
Reserved: 2026-03-15T11:55:45.299Z
Link: CVE-2026-4208
Updated: 2026-03-17T13:17:01.174Z
Status : Analyzed
Published: 2026-03-17T09:16:14.810
Modified: 2026-04-25T18:43:03.957
Link: CVE-2026-4208
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:49:28Z
Github GHSA