Skip to content

Commit 36ee4c4

Browse files
1 parent f280657 commit 36ee4c4

File tree

4 files changed

+583
-0
lines changed

4 files changed

+583
-0
lines changed
Lines changed: 168 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,168 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5j7q-wmh7-cqhg",
4+
"modified": "2026-01-13T20:37:30Z",
5+
"published": "2026-01-13T20:37:30Z",
6+
"aliases": [
7+
"CVE-2025-59020"
8+
],
9+
"summary": "TYPO3 CMS Allows Broken Access Control in Edit Document Controller",
10+
"details": "### Problem\nBy exploiting the `defVals` parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields.\n\n### Solution\nUpdate to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.\n\n### Credits\nThanks to Daniel Windloff for reporting this issue, and to TYPO3 core & security team member Benjamin Franzke for fixing it.\n\n### References\n* [TYPO3-CORE-SA-2026-001](https://typo3.org/security/advisory/typo3-core-sa-2026-001)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "typo3/cms-backend"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "14.0.0"
29+
},
30+
{
31+
"fixed": "14.0.2"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 14.0.1"
38+
}
39+
},
40+
{
41+
"package": {
42+
"ecosystem": "Packagist",
43+
"name": "typo3/cms-backend"
44+
},
45+
"ranges": [
46+
{
47+
"type": "ECOSYSTEM",
48+
"events": [
49+
{
50+
"introduced": "13.0.0"
51+
},
52+
{
53+
"fixed": "13.4.23"
54+
}
55+
]
56+
}
57+
],
58+
"database_specific": {
59+
"last_known_affected_version_range": "<= 13.4.22"
60+
}
61+
},
62+
{
63+
"package": {
64+
"ecosystem": "Packagist",
65+
"name": "typo3/cms-backend"
66+
},
67+
"ranges": [
68+
{
69+
"type": "ECOSYSTEM",
70+
"events": [
71+
{
72+
"introduced": "12.0.0"
73+
},
74+
{
75+
"fixed": "12.4.41"
76+
}
77+
]
78+
}
79+
],
80+
"database_specific": {
81+
"last_known_affected_version_range": "<= 12.4.40"
82+
}
83+
},
84+
{
85+
"package": {
86+
"ecosystem": "Packagist",
87+
"name": "typo3/cms-backend"
88+
},
89+
"ranges": [
90+
{
91+
"type": "ECOSYSTEM",
92+
"events": [
93+
{
94+
"introduced": "11.0.0"
95+
},
96+
{
97+
"fixed": "11.5.49"
98+
}
99+
]
100+
}
101+
],
102+
"database_specific": {
103+
"last_known_affected_version_range": "<= 11.5.48"
104+
}
105+
},
106+
{
107+
"package": {
108+
"ecosystem": "Packagist",
109+
"name": "typo3/cms-backend"
110+
},
111+
"ranges": [
112+
{
113+
"type": "ECOSYSTEM",
114+
"events": [
115+
{
116+
"introduced": "10.0.0"
117+
},
118+
{
119+
"fixed": "10.4.55"
120+
}
121+
]
122+
}
123+
],
124+
"database_specific": {
125+
"last_known_affected_version_range": "<= 10.4.54"
126+
}
127+
}
128+
],
129+
"references": [
130+
{
131+
"type": "WEB",
132+
"url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-5j7q-wmh7-cqhg"
133+
},
134+
{
135+
"type": "ADVISORY",
136+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59020"
137+
},
138+
{
139+
"type": "WEB",
140+
"url": "https://github.com/TYPO3/typo3/commit/ac3f792bd5ab7c58153fc1075cb9e001c9cebe3b"
141+
},
142+
{
143+
"type": "WEB",
144+
"url": "https://github.com/TYPO3/typo3/commit/cd11a19958d823d12d028f9345b41739c7e70118"
145+
},
146+
{
147+
"type": "WEB",
148+
"url": "https://github.com/TYPO3/typo3/commit/fb98378a8fd30dd50d89a3d1a420780819f38232"
149+
},
150+
{
151+
"type": "PACKAGE",
152+
"url": "https://github.com/TYPO3/typo3"
153+
},
154+
{
155+
"type": "WEB",
156+
"url": "https://typo3.org/security/advisory/typo3-core-sa-2026-001"
157+
}
158+
],
159+
"database_specific": {
160+
"cwe_ids": [
161+
"CWE-863"
162+
],
163+
"severity": "MODERATE",
164+
"github_reviewed": true,
165+
"github_reviewed_at": "2026-01-13T20:37:30Z",
166+
"nvd_published_at": "2026-01-13T12:15:49Z"
167+
}
168+
}
Lines changed: 168 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,168 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6c46-p6j5-3f49",
4+
"modified": "2026-01-13T20:37:37Z",
5+
"published": "2026-01-13T20:37:37Z",
6+
"aliases": [
7+
"CVE-2025-59021"
8+
],
9+
"summary": "TYPO3 CMS Allows Broken Access Control in Redirects Module",
10+
"details": "### Problem\nBackend users with access to the redirects module and write permission on the `sys_redirect` table were able to read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.\n\n### Solution\nUpdate to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.\n\n### Credits\nThanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.\n\n### References\n* [TYPO3-CORE-SA-2026-002](https://typo3.org/security/advisory/typo3-core-sa-2026-002)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "typo3/cms-redirects"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "14.0.0"
29+
},
30+
{
31+
"fixed": "14.0.2"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 14.0.1"
38+
}
39+
},
40+
{
41+
"package": {
42+
"ecosystem": "Packagist",
43+
"name": "typo3/cms-redirects"
44+
},
45+
"ranges": [
46+
{
47+
"type": "ECOSYSTEM",
48+
"events": [
49+
{
50+
"introduced": "13.0.0"
51+
},
52+
{
53+
"fixed": "13.4.23"
54+
}
55+
]
56+
}
57+
],
58+
"database_specific": {
59+
"last_known_affected_version_range": "<= 13.4.22"
60+
}
61+
},
62+
{
63+
"package": {
64+
"ecosystem": "Packagist",
65+
"name": "typo3/cms-redirects"
66+
},
67+
"ranges": [
68+
{
69+
"type": "ECOSYSTEM",
70+
"events": [
71+
{
72+
"introduced": "12.0.0"
73+
},
74+
{
75+
"fixed": "12.4.41"
76+
}
77+
]
78+
}
79+
],
80+
"database_specific": {
81+
"last_known_affected_version_range": "<= 12.4.40"
82+
}
83+
},
84+
{
85+
"package": {
86+
"ecosystem": "Packagist",
87+
"name": "typo3/cms-redirects"
88+
},
89+
"ranges": [
90+
{
91+
"type": "ECOSYSTEM",
92+
"events": [
93+
{
94+
"introduced": "11.0.0"
95+
},
96+
{
97+
"fixed": "11.5.49"
98+
}
99+
]
100+
}
101+
],
102+
"database_specific": {
103+
"last_known_affected_version_range": "<= 11.5.48"
104+
}
105+
},
106+
{
107+
"package": {
108+
"ecosystem": "Packagist",
109+
"name": "typo3/cms-redirects"
110+
},
111+
"ranges": [
112+
{
113+
"type": "ECOSYSTEM",
114+
"events": [
115+
{
116+
"introduced": "10.0.0"
117+
},
118+
{
119+
"fixed": "10.4.55"
120+
}
121+
]
122+
}
123+
],
124+
"database_specific": {
125+
"last_known_affected_version_range": "<= 10.4.54"
126+
}
127+
}
128+
],
129+
"references": [
130+
{
131+
"type": "WEB",
132+
"url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-6c46-p6j5-3f49"
133+
},
134+
{
135+
"type": "ADVISORY",
136+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59021"
137+
},
138+
{
139+
"type": "WEB",
140+
"url": "https://github.com/TYPO3/typo3/commit/8a46abd8993e3a5a31a834dcd6c8f91adef57ce4"
141+
},
142+
{
143+
"type": "WEB",
144+
"url": "https://github.com/TYPO3/typo3/commit/bac370df5c1c3fcf5ebc1c030fbd2bec86d6a686"
145+
},
146+
{
147+
"type": "WEB",
148+
"url": "https://github.com/TYPO3/typo3/commit/fbbae3b9a40d0420207ef7af990cdf1ac0612c0b"
149+
},
150+
{
151+
"type": "PACKAGE",
152+
"url": "https://github.com/TYPO3/typo3"
153+
},
154+
{
155+
"type": "WEB",
156+
"url": "https://typo3.org/security/advisory/typo3-core-sa-2026-002"
157+
}
158+
],
159+
"database_specific": {
160+
"cwe_ids": [
161+
"CWE-862"
162+
],
163+
"severity": "MODERATE",
164+
"github_reviewed": true,
165+
"github_reviewed_at": "2026-01-13T20:37:37Z",
166+
"nvd_published_at": "2026-01-13T12:15:50Z"
167+
}
168+
}

0 commit comments

Comments
 (0)