The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://typo3.org/security/advisory/typo3-ext-sa-2026-007 |
|
History
Tue, 17 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider. | |
| Title | Authentication Bypass in extension "E-Mail MFA Provider" (mfa_email) | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TYPO3
Published:
Updated: 2026-03-17T08:34:52.141Z
Reserved: 2026-03-15T11:55:45.299Z
Link: CVE-2026-4208
No data.
Status : Received
Published: 2026-03-17T09:16:14.810
Modified: 2026-03-17T09:16:14.810
Link: CVE-2026-4208
No data.
OpenCVE Enrichment
No data.
Weaknesses