CVE-2025-59017

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated backend users in TYPO3 CMS to bypass authorization checks and directly access AJAX backend routes they shouldn't have permission to use. It affects TYPO3 CMS installations with backend user accounts across multiple major versions. Attackers with backend access can exploit missing authorization controls to perform unauthorized actions.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires backend user accounts to be present. All standard TYPO3 installations with backend users are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged backend users could escalate privileges, access sensitive data, modify system configurations, or execute arbitrary code through vulnerable AJAX endpoints, potentially leading to complete system compromise.

🟠

Likely Case

Backend users with limited permissions could access administrative functions or sensitive data they're not authorized to view, leading to data exposure or unauthorized system changes.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users potentially accessing a few additional functions they shouldn't have, with audit trails for detection.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated backend access. Attackers need to identify and target specific AJAX backend routes that lack proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to: 9.5.55, 10.4.54, 11.5.48, 12.4.37, 13.4.18 or later

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-021

Restart Required: No

Instructions:

1. Backup your TYPO3 installation and database. 2. Update TYPO3 core using Composer: composer update typo3/cms-core. 3. Or manually download and replace core files from official TYPO3 downloads. 4. Clear all caches in TYPO3 backend. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict Backend User Access

all

Temporarily limit backend user permissions and reduce number of backend users to minimum required.

Implement Web Application Firewall Rules

all

Block suspicious AJAX requests to backend routes using WAF rules.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all backend user accounts
  • Enable detailed logging of backend user activities and monitor for unauthorized AJAX requests

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in backend under 'Admin Tools > System Information' or in typo3/sysext/core/Classes/Information/Typo3Version.php

Check Version:

php typo3/sysext/core/bin/typo3 --version

Verify Fix Applied:

Verify version is updated to patched version and test backend user permissions for AJAX route access

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests from backend users
  • Access to backend routes by unauthorized users
  • Failed authorization checks in TYPO3 logs

Network Indicators:

  • Suspicious POST/GET requests to /typo3/ backend AJAX endpoints
  • Unusual patterns in backend user activity

SIEM Query:

source="typo3.log" AND ("authorization failed" OR "access denied" OR "AJAX route")

🔗 References

📤 Share & Export