CVE-2025-59019

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated backend users in TYPO3 CMS to download CSV files containing data from database tables they shouldn't have access to, specifically from web mounts they lack permissions for. It affects TYPO3 CMS installations with vulnerable versions and backend user accounts.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: 11.0.0-11.5.47, 12.0.0-12.4.36, 13.0.0-13.4.17
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires backend user access; vulnerability exists in default CSV download functionality

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged backend users could exfiltrate sensitive data from any database table within their web mounts, potentially exposing confidential information, user data, or configuration details.

🟠

Likely Case

Backend users with limited permissions could access data beyond their intended scope, leading to information disclosure of non-critical but potentially sensitive data.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to authorized users accessing data they shouldn't see, but not system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated backend user access; exploitation involves using CSV download feature with crafted parameters

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TYPO3 v11.5.48, v12.4.37, v13.4.18

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2025-023

Restart Required: No

Instructions:

1. Update TYPO3 to patched version (11.5.48, 12.4.37, or 13.4.18). 2. Apply via Composer: composer require typo3/cms-core:~11.5.48 (adjust version). 3. Clear caches via Install Tool or CLI.

🔧 Temporary Workarounds

Disable CSV download feature

all

Remove or restrict access to the CSV download functionality in backend

Modify TYPO3 backend configuration to disable CSV export features

Restrict backend user permissions

all

Limit backend user access to only necessary modules and functions

Review and tighten backend user group permissions in TYPO3 backend

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege for all backend users
  • Monitor CSV download activities and database access logs for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in Install Tool or via CLI: php typo3/sysext/core/bin/typo3 --version

Check Version:

php typo3/sysext/core/bin/typo3 --version

Verify Fix Applied:

Confirm version is 11.5.48+, 12.4.37+, or 13.4.18+ and test CSV download with limited user

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV download requests from backend users
  • Database queries from CSV export functionality accessing unexpected tables

Network Indicators:

  • Large CSV file downloads from backend users
  • Patterns of CSV export requests

SIEM Query:

source="typo3.log" AND "CSV" AND "download" AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export