CVE-2025-59022: Schwerwiegende Zugriffskontrolle-Lücke im TYPO3 Recycler-Modul
Autor: Oliver Hader
⚠️ CVE-Referenzen:
CVE-2025-59022
Zusammenfassung
Sicherheitsforscher haben eine kritische Schwachstelle im TYPO3-CMS-Recycler-Modul entdeckt. Angreifer mit Zugriff auf das Backend konnten damit beliebige Daten aus der Datenbank löschen - unabhängig von ihren eigentlichen Berechtigungen. Dies könnte zu einem Totalausfall der Website führen. Ein Patch ist verfügbar, Anwender sollten schnell updaten.
Component Type: TYPO3 CMSSubcomponent: Recycler (ext:recycler)Release Date: January 13, 2026Vulnerability Type: Broken Access ControlAffected Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1Severity: HighSuggested CVSS: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:NReferences: CVE-2025-59022, CWE-862
Problem Description
Backend users who had access to the recycler module could delete arbitrary data from any database table defined in the TCA - regardless of whether they had permission to that particular table. This allowed attackers to purge and destroy critical site data, effectively rendering the website unavailable.
Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
Credits
Thanks to Sven Jürgens and Daniel Windloff for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
General Note
All security-related code changes are tagged so you can easily look them up in our review system.
Quelle: typo3.org