CVE-2025-59021: TYPO3 CMS Allows Broken Access Control in Redirects Module
Problem
Backend users with access to the redirects module and write permission on the sys_redirect table were able to read, create, and modify any redirect record - without restriction to the user’s own file‑mounts or web‑mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs - facilitating phishing or other malicious redirect attacks.
Solution
Update to TYPO3 versions 10.4.55 ELTS, 11.5.49 ELTS, 12.4.41 LTS, 13.4.23 LTS, 14.0.2 that fix the problem described.
Credits
Thanks to Georg Dümmler for reporting this issue, and to TYPO3 security team member Elias Häußler for fixing it.
References
References
- github.com/TYPO3/typo3
- github.com/TYPO3/typo3/commit/8a46abd8993e3a5a31a834dcd6c8f91adef57ce4
- github.com/TYPO3/typo3/commit/bac370df5c1c3fcf5ebc1c030fbd2bec86d6a686
- github.com/TYPO3/typo3/commit/fbbae3b9a40d0420207ef7af990cdf1ac0612c0b
- github.com/TYPO3/typo3/security/advisories/GHSA-6c46-p6j5-3f49
- github.com/advisories/GHSA-6c46-p6j5-3f49
- nvd.nist.gov/vuln/detail/CVE-2025-59021
- typo3.org/security/advisory/typo3-core-sa-2026-002
Code Behaviors & Features
Detect and mitigate CVE-2025-59021 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →