The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.
History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.
Title Authentication Bypass in extension "E-Mail MFA Provider" (mfa_email)
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TYPO3

Published:

Updated: 2026-03-17T13:17:07.532Z

Reserved: 2026-03-15T11:55:45.299Z

Link: CVE-2026-4208

cve-icon Vulnrichment

Updated: 2026-03-17T13:17:01.174Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-17T09:16:14.810

Modified: 2026-03-17T14:20:01.670

Link: CVE-2026-4208

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.