The following matrix shows the TYPO3 versions currently maintained by the TYPO3 community. Sprint releases (versions before 13.4.0 and 12.4.0, in their corresponding branches) have reached their end of support and don't receive any further bug fixes or security patches.
Version | Supported |
---|---|
13.4.x | ✅ |
13.3.x | ❌ |
13.2.x | ❌ |
13.1.x | ❌ |
13.0.x | ❌ |
12.4.x | ✅ |
< 12.4.0 | ❌ |
Please report vulnerabilities to security@typo3.org. Your report should include the following details:
- The affected project (either the TYPO3 Core or a TYPO3 extension).
- The exact version or version range that you analysed.
- A step-by-step explanation of how to exploit the potential vulnerability.
You can use the following GPG/PGP key ID to optionally encrypt your messages to security@typo3.org:
- Key ID:
C05FBE60
- Fingerprint:
B41C C3EF 373E 0F5C 7018 7FE9 3BEF BD27 C05F BE60
You can download the public key from the following sources:
⚠️ We urge security researchers not to publish vulnerabilities in issue trackers or discuss them publicly (e.g. on Slack or Twitter).
The TYPO3 Security Team coordinates the process with the TYPO3 core developers, extension maintainers and other affected parties. Once a security fix is available, we prepare a new release and publish the fixed version. At the same time, we communicate the vulnerability and the fix to the public by using various communication channels such as:
- TYPO3 Security Advisories
- TYPO3 Security Team on Twitter
- #announce channel on Slack
- TYPO3 Announce Mailing List
The TYPO3 Security Team takes care of requesting CVE IDs (Common Vulnerabilities and Exposures identifiers).
We aim to publish TYPO3 maintenance releases on Tuesdays as a general rule. However, exceptions apply (e.g. public holidays). Release dates of maintenance releases are scheduled in advance. These releases can contain security fixes.