Описание
TYPO3 CMS Allows Broken Access Control in Redirects Module
Problem
Backend users with access to the redirects module and write permission on the sys_redirect table were able to read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.
Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
Credits
Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
References
Ссылки
- https://github.com/TYPO3/typo3/security/advisories/GHSA-6c46-p6j5-3f49
- https://nvd.nist.gov/vuln/detail/CVE-2025-59021
- https://github.com/TYPO3/typo3/commit/8a46abd8993e3a5a31a834dcd6c8f91adef57ce4
- https://github.com/TYPO3/typo3/commit/bac370df5c1c3fcf5ebc1c030fbd2bec86d6a686
- https://github.com/TYPO3/typo3/commit/fbbae3b9a40d0420207ef7af990cdf1ac0612c0b
- https://typo3.org/security/advisory/typo3-core-sa-2026-002
Пакеты
typo3/cms-redirects
>= 14.0.0, <= 14.0.1
14.0.2
typo3/cms-redirects
>= 13.0.0, <= 13.4.22
13.4.23
typo3/cms-redirects
>= 12.0.0, <= 12.4.40
12.4.41
typo3/cms-redirects
>= 11.0.0, <= 11.5.48
11.5.49
typo3/cms-redirects
>= 10.0.0, <= 10.4.54
10.4.55
Связанные уязвимости
Backend users with access to the redirects module and write permission on the sys_redirect table were able to read, create, and modify any redirect record without restriction to the user’s own file-mounts or web-mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs – facilitating phishing or other malicious redirect attacks. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.