CVE-2025-59021

6.4 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in TYPO3 CMS where backend users with redirect module access and write permissions could manipulate any redirect record without proper mount restrictions. This allows attackers to create or modify redirects pointing to malicious URLs, enabling phishing or other redirect-based attacks. Affected versions include TYPO3 CMS 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, and 14.0.0-14.0.1.

💻 Affected Systems

Products:
  • TYPO3 CMS
Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires backend user with access to redirects module and write permission on sys_redirect table. Default installations with typical backend user roles are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with backend access could redirect legitimate website traffic to phishing sites, malware distribution points, or credential harvesting pages, potentially compromising all site visitors.

🟠

Likely Case

Malicious redirects inserted by compromised or rogue backend users lead to phishing campaigns targeting website visitors, damaging brand reputation and user trust.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to redirect manipulation within authorized user scopes, preventing widespread malicious redirects.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated backend access with specific permissions. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TYPO3 v10.4.55, v11.5.49, v12.4.41, v13.4.23, v14.0.2

Vendor Advisory: https://typo3.org/security/advisory/typo3-core-sa-2026-002

Restart Required: No

Instructions:

1. Identify your TYPO3 version. 2. Update to the patched version using Composer: composer require typo3/cms-core:~10.4.55 (adjust version). 3. Clear caches via Install Tool. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict redirect module access

all

Temporarily remove redirect module permissions from backend users who don't absolutely need them.

Navigate to Admin Tools > Access > Backend Users > Edit user > Modules > Uncheck 'Redirects'

Implement redirect validation

all

Add custom validation to ensure redirects only point to allowed domains or internal paths.

Implement custom TYPO3 extension with hook in DataHandler to validate redirect URLs

🧯 If You Can't Patch

  • Restrict backend user permissions to minimum required, especially for redirect module access.
  • Implement web application firewall rules to detect and block suspicious redirect patterns.

🔍 How to Verify

Check if Vulnerable:

Check TYPO3 version in Install Tool or via composer show typo3/cms-core. If version falls within affected ranges, system is vulnerable.

Check Version:

composer show typo3/cms-core | grep versions

Verify Fix Applied:

After update, verify version shows patched version (e.g., 10.4.55 or higher). Test redirect creation with limited user to ensure mount restrictions work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect creation/modification patterns
  • Backend user activity from unexpected IPs or times
  • sys_log entries showing redirect table modifications

Network Indicators:

  • HTTP 301/302 redirects to external domains not in allowlist
  • Redirect chains pointing to suspicious domains

SIEM Query:

source="typo3" AND (event="redirect_created" OR event="redirect_modified") AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export