CVE-2025-7900
📋 TL;DR
The femanager extension for TYPO3 contains an Insecure Direct Object Reference vulnerability that allows attackers to modify user data without proper authorization. This affects websites running vulnerable versions of the femanager extension, potentially compromising user accounts and data integrity.
💻 Affected Systems
- TYPO3 femanager extension
📦 What is this software?
Typo3 by Typo3
Typo3 by Typo3
Typo3 by Typo3
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify any user's profile data, escalate privileges, or take over accounts by changing email addresses and passwords.
Likely Case
Unauthorized modification of user profiles, potentially leading to account compromise or data manipulation.
If Mitigated
Limited impact with proper access controls and input validation in place.
🎯 Exploit Status
Exploitation requires some level of access but is relatively straightforward once the vulnerability is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: femanager 6.4.2, 7.5.3, 8.3.1
Vendor Advisory: https://typo3.org/security/advisory/typo3-ext-sa-2025-010
Restart Required: No
Instructions:
1. Update femanager extension via TYPO3 Extension Manager or Composer. 2. For version 6.x: Update to 6.4.2. 3. For version 7.x: Update to 7.5.3. 4. For version 8.x: Update to 8.3.1. 5. Clear TYPO3 caches after update.
🔧 Temporary Workarounds
Disable femanager extension
allTemporarily disable the femanager extension until patching is possible.
typo3cms extension:deactivate femanager
Restrict access to user management
allImplement IP-based restrictions or authentication requirements for user profile modification endpoints.
🧯 If You Can't Patch
- Implement additional server-side authorization checks for all user data modification requests.
- Enable detailed logging of all user profile modification attempts and monitor for suspicious activity.
🔍 How to Verify
Check if Vulnerable:
Check femanager extension version in TYPO3 Extension Manager or via composer show inkl/femanager.
Check Version:
composer show inkl/femanager | grep version
Verify Fix Applied:
Verify femanager version is 6.4.2, 7.5.3, or 8.3.1 or higher.
📡 Detection & Monitoring
Log Indicators:
- Unusual user profile modifications, especially from unexpected IP addresses or user accounts.
Network Indicators:
- HTTP POST requests to user profile update endpoints with manipulated user IDs.
SIEM Query:
web_access_logs WHERE (uri CONTAINS '/femanager/' AND method = 'POST') AND (user_agent NOT IN expected_user_agents OR src_ip NOT IN allowed_ips)