CVE-2025-48200

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in the sr_feuser_register TYPO3 extension allows unauthenticated attackers to execute arbitrary code on affected systems. All TYPO3 installations using vulnerable versions of this extension are affected, potentially compromising entire websites and servers.

💻 Affected Systems

Products:
  • TYPO3 sr_feuser_register extension
Versions: Through 12.4.8
Operating Systems: All operating systems running TYPO3
Default Config Vulnerable: ⚠️ Yes
Notes: All TYPO3 installations with the sr_feuser_register extension enabled are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining full control over the web server, database, and underlying operating system, leading to data theft, ransomware deployment, or use as a botnet node.

🟠

Likely Case

Website defacement, data exfiltration, backdoor installation, and lateral movement within the hosting environment.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented, though exploitation risk remains high.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a popular extension with public exploit details available, making automated exploitation highly probable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.4.9 or later

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2025-008

Restart Required: No

Instructions:

1. Update the sr_feuser_register extension to version 12.4.9 or later via TYPO3 Extension Manager. 2. Clear all caches in TYPO3 backend. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Extension

all

Temporarily disable the sr_feuser_register extension until patching is possible

typo3cms extension:deactivate sr_feuser_register

Remove Extension Files

linux

Completely remove the extension files from the TYPO3 installation

rm -rf typo3conf/ext/sr_feuser_register/

🧯 If You Can't Patch

  • Implement strict web application firewall rules to block suspicious POST requests to user registration endpoints
  • Isolate affected TYPO3 instances in a segmented network zone with no access to critical systems

🔍 How to Verify

Check if Vulnerable:

Check the extension version in TYPO3 Extension Manager or examine typo3conf/ext/sr_feuser_register/ext_emconf.php for version number

Check Version:

grep '"version"' typo3conf/ext/sr_feuser_register/ext_emconf.php

Verify Fix Applied:

Confirm sr_feuser_register extension version is 12.4.9 or higher in TYPO3 Extension Manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to user registration endpoints
  • Unexpected PHP file creation in web directories
  • Suspicious system command execution in web server logs

Network Indicators:

  • Outbound connections to unknown IPs from web server
  • Unusual traffic patterns to/from TYPO3 instance

SIEM Query:

source="web_logs" AND (uri_path="/index.php?eID=sr_feuser_register" OR user_agent CONTAINS "curl" OR user_agent CONTAINS "wget") AND status=200

🔗 References

📤 Share & Export