Vulnerability Details CVE-2026-1323
The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.3%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-1323
-
cpe:2.3:a:cps-it:mailqueue:0.1.0
-
cpe:2.3:a:cps-it:mailqueue:0.1.1
-
cpe:2.3:a:cps-it:mailqueue:0.1.2
-
cpe:2.3:a:cps-it:mailqueue:0.1.3
-
cpe:2.3:a:cps-it:mailqueue:0.2.0
-
cpe:2.3:a:cps-it:mailqueue:0.2.1
-
cpe:2.3:a:cps-it:mailqueue:0.3.0
-
cpe:2.3:a:cps-it:mailqueue:0.3.1
-
cpe:2.3:a:cps-it:mailqueue:0.3.2
-
cpe:2.3:a:cps-it:mailqueue:0.4.0
-
cpe:2.3:a:cps-it:mailqueue:0.4.1
-
cpe:2.3:a:cps-it:mailqueue:0.4.2
-
cpe:2.3:a:cps-it:mailqueue:0.4.3
-
cpe:2.3:a:cps-it:mailqueue:0.4.4
-
cpe:2.3:a:cps-it:mailqueue:0.5.0
-
cpe:2.3:a:cps-it:mailqueue:0.5.1