CVE-2025-48207

8.6 HIGH

📋 TL;DR

The reint_downloadmanager extension for TYPO3 contains an Insecure Direct Object Reference vulnerability that allows attackers to access unauthorized files or data. This affects all TYPO3 installations using the vulnerable extension version. Attackers can exploit this without authentication to retrieve sensitive information.

💻 Affected Systems

Products:
  • TYPO3 CMS with reint_downloadmanager extension
Versions: reint_downloadmanager extension through 5.0.0
Operating Systems: All operating systems running TYPO3
Default Config Vulnerable: ⚠️ Yes
Notes: All TYPO3 installations using the vulnerable extension version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through sensitive file disclosure, credential theft, or lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, user information, or proprietary content.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation preventing access to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

IDOR vulnerabilities are typically easy to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: reint_downloadmanager 5.0.1 or later

Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2025-004

Restart Required: No

Instructions:

1. Update the reint_downloadmanager extension to version 5.0.1 or later via TYPO3 Extension Manager. 2. Clear all caches in TYPO3 backend. 3. Verify the extension version in Extension Manager.

🔧 Temporary Workarounds

Disable vulnerable extension

all

Temporarily disable the reint_downloadmanager extension until patching is possible

typo3cms extension:deactivate reint_downloadmanager

Restrict file access

linux

Implement strict file permissions and access controls on the TYPO3 file system

chmod 640 typo3conf/ext/reint_downloadmanager/
chown www-data:www-data typo3conf/ext/reint_downloadmanager/

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious file access patterns
  • Enable detailed logging and monitoring for file access attempts through the extension

🔍 How to Verify

Check if Vulnerable:

Check the extension version in TYPO3 Extension Manager or via command line: typo3cms extension:list | grep reint_downloadmanager

Check Version:

typo3cms extension:list | grep reint_downloadmanager

Verify Fix Applied:

Confirm extension version is 5.0.1 or higher and test file access functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in TYPO3 logs
  • Multiple failed file access attempts
  • Access to files outside expected download directories

Network Indicators:

  • Unusual HTTP requests to download endpoints
  • Patterns of sequential file ID requests

SIEM Query:

source="typo3.log" AND ("reint_downloadmanager" OR "download") AND (status="403" OR status="404") | stats count by src_ip

🔗 References

📤 Share & Export