CVE-2025-48205

8.6 HIGH

📋 TL;DR

The sr_feuser_register extension for TYPO3 contains an Insecure Direct Object Reference vulnerability that allows attackers to access or modify user registration data without proper authorization. This affects all TYPO3 installations using sr_feuser_register extension versions through 12.4.8. Attackers could potentially manipulate user accounts or registration processes.

💻 Affected Systems

Products:
  • TYPO3 sr_feuser_register extension
Versions: Through 12.4.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects TYPO3 installations with the sr_feuser_register extension installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify or delete user accounts, manipulate registration data, or potentially escalate privileges by accessing administrative functions through manipulated object references.

🟠

Likely Case

Unauthorized access to user registration data, allowing attackers to view or modify personal information of registered users.

🟢

If Mitigated

Limited impact with proper access controls and input validation in place, though the vulnerability would still exist at the code level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some understanding of the extension's object reference system but is technically straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.4.9 or later

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2025-008

Restart Required: No

Instructions:

1. Update the sr_feuser_register extension to version 12.4.9 or later via TYPO3 Extension Manager
2. Clear all caches in TYPO3 backend
3. Verify the extension version in Extension Manager

🔧 Temporary Workarounds

Disable sr_feuser_register extension

all

Temporarily disable the vulnerable extension until patching is possible

typo3cms extension:deactivate sr_feuser_register

Implement additional access controls

all

Add custom access control checks in user registration controllers

🧯 If You Can't Patch

  • Disable the sr_feuser_register extension immediately
  • Implement web application firewall rules to block suspicious object reference patterns

🔍 How to Verify

Check if Vulnerable:

Check Extension Manager in TYPO3 backend for sr_feuser_register version. If version is 12.4.8 or earlier, system is vulnerable.

Check Version:

typo3cms extension:list | grep sr_feuser_register

Verify Fix Applied:

Verify sr_feuser_register extension version is 12.4.9 or later in TYPO3 Extension Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user registration modifications
  • Failed authorization attempts on user registration endpoints
  • Suspicious parameter values in registration requests

Network Indicators:

  • HTTP requests with manipulated object IDs in registration endpoints
  • Unusual patterns in user registration API calls

SIEM Query:

web_logs WHERE (url CONTAINS '/index.php?eID=tx_srfeuserregister' OR url CONTAINS 'sr_feuser_register') AND (params CONTAINS 'uid' OR params CONTAINS 'id') AND status_code = 200

🔗 References

📤 Share & Export