CVE-2025-47940

7.2 HIGH

📋 TL;DR

This vulnerability allows TYPO3 administrator-level backend users without system maintainer privileges to escalate their privileges and gain system maintainer access. It affects TYPO3 installations starting from version 10.0.0 up to specific patched versions. Exploitation requires a valid administrator account.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: Starting from version 10.0.0 and prior to versions 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, and 13.4.12 LTS
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator-level backend user account. System maintainer privileges are not required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious administrator gains full system maintainer privileges, enabling complete control over the TYPO3 instance including code execution, data manipulation, and further system compromise.

🟠

Likely Case

Privileged administrator users escalate to system maintainer level, gaining unauthorized access to sensitive system functions and configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized privilege escalation that can be detected and contained.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid administrator credentials. The vulnerability is in the privilege escalation mechanism within TYPO3 backend.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-016

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Update to the appropriate patched version: 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS. 3. Follow TYPO3 update procedures for your specific version.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit the number of administrator accounts and implement strict access controls.

Monitor Administrator Activities

all

Implement enhanced logging and monitoring for administrator-level user actions.

🧯 If You Can't Patch

  • Temporarily disable or restrict administrator accounts that don't require system maintainer access.
  • Implement additional authentication factors for administrator accounts and monitor for privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in the backend under 'Admin Tools > System > Environment' or examine the typo3/sysext/core/Classes/Information/Typo3Version.php file.

Check Version:

php -r "include 'typo3/sysext/core/Classes/Information/Typo3Version.php'; echo \TYPO3\CMS\Core\Information\Typo3Version::VERSION;"

Verify Fix Applied:

Verify the TYPO3 version matches one of the patched versions: 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in TYPO3 backend logs
  • Administrator users gaining system maintainer privileges unexpectedly
  • Changes to user permissions or roles from administrator accounts

Network Indicators:

  • Unusual backend administrative activity patterns
  • Multiple privilege change requests from single administrator accounts

SIEM Query:

source="typo3.log" AND ("privilege escalation" OR "system maintainer" OR "user permission change")

🔗 References

📤 Share & Export