CVE-2026-1323 - Insecure Deserialization in extension "Mailqueue" (mailqueue)
CVE ID :CVE-2026-1323
Published : March 17, 2026, 9:16 a.m. | 3 hours, 14 minutes ago
Description :The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
Severity: 5.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : March 17, 2026, 9:16 a.m. | 3 hours, 14 minutes ago
Description :The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
Severity: 5.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...