CVE-2025-59021: Zugangskontrollschwäche in TYPO3-Weiterleitungsmodul

⚠️ CVE-Referenzen: CVE-2025-59021

Zusammenfassung

Schwachstelle in TYPO3-Erweiterung "Redirects" erlaubte Backend-Nutzern mit Zugriff darauf, beliebige Weiterleitungen zu erstellen oder zu ändern - unabhängig von ihren eigentlichen Berechtigungen. Das eröffnete Angreifern Möglichkeiten für Phishing-Attacken oder andere Umleitungen zu schädlichen Zielen. Ein Update auf die Versionen 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS oder 14.0.2 behebt das Problem.

Component Type: TYPO3 CMSSubcomponent: Redirects (ext:redirects)Release Date: January 13, 2026Vulnerability Type: Broken Access ControlAffected Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1Severity: MediumSuggested CVSS: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:NReferences: CVE-2025-59021, CWE-862 Problem Description Backend users with access to the redirects module and write permission on the sys_redirect table were able to  read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks. Solution Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described. Credits Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it. General Advice Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list. General Note All security-related code changes are tagged so you can easily look them up in our review system.
Quelle: typo3.org