CVE-2025-59021: Zugangskontrollschwäche in TYPO3-Weiterleitungsmodul
Autor: Oliver Hader
⚠️ CVE-Referenzen:
CVE-2025-59021
Zusammenfassung
Schwachstelle in TYPO3-Erweiterung "Redirects" erlaubte Backend-Nutzern mit Zugriff darauf, beliebige Weiterleitungen zu erstellen oder zu ändern - unabhängig von ihren eigentlichen Berechtigungen. Das eröffnete Angreifern Möglichkeiten für Phishing-Attacken oder andere Umleitungen zu schädlichen Zielen. Ein Update auf die Versionen 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS oder 14.0.2 behebt das Problem.
Component Type: TYPO3 CMSSubcomponent: Redirects (ext:redirects)Release Date: January 13, 2026Vulnerability Type: Broken Access ControlAffected Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1Severity: MediumSuggested CVSS: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:NReferences: CVE-2025-59021, CWE-862
Problem Description
Backend users with access to the redirects module and write permission on the sys_redirect table were able to read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.
Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
Credits
Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
General Note
All security-related code changes are tagged so you can easily look them up in our review system.
Quelle: typo3.org