CVE-2025-59022: Schwerwiegende Zugriffskontrolle-Lücke im TYPO3 Recycler-Modul

⚠️ CVE-Referenzen: CVE-2025-59022

Zusammenfassung

Sicherheitsforscher haben eine kritische Schwachstelle im TYPO3-CMS-Recycler-Modul entdeckt. Angreifer mit Zugriff auf das Backend konnten damit beliebige Daten aus der Datenbank löschen - unabhängig von ihren eigentlichen Berechtigungen. Dies könnte zu einem Totalausfall der Website führen. Ein Patch ist verfügbar, Anwender sollten schnell updaten.

Component Type: TYPO3 CMSSubcomponent: Recycler (ext:recycler)Release Date: January 13, 2026Vulnerability Type: Broken Access ControlAffected Versions: 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22, 14.0.0-14.0.1Severity: HighSuggested CVSS: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:NReferences: CVE-2025-59022, CWE-862 Problem Description Backend users who had access to the recycler module could delete arbitrary data from any database table defined in the TCA - regardless of whether they had permission to that particular table. This allowed attackers to purge and destroy critical site data, effectively rendering the website unavailable. Solution Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described. Credits Thanks to Sven Jürgens and Daniel Windloff for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it. General Advice Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list. General Note All security-related code changes are tagged so you can easily look them up in our review system.
Quelle: typo3.org