CVE-2025-59021

Traffic Cop Gone Rogue: Hijacking TYPO3 Redirects

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 14, 2026·5 min read·2 visits

Executive Summary (TL;DR)

In multi-site TYPO3 installations, the Redirects module failed to enforce 'Webmount' boundaries. This means a low-privileged editor assigned to manage a small sub-site could view, modify, and delete URL redirects for the entire CMS instance—including main corporate domains. While not Remote Code Execution (RCE), it allows for high-impact Phishing and SEO poisoning.

A Broken Access Control vulnerability in TYPO3 CMS allows restricted backend users to manage redirects for sites they shouldn't access, enabling domain hijacking and phishing campaigns.

Fix Analysis (2)

Technical Appendix

CVSS Score
5.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS Probability
0.04%
Top 89% most exploited

Affected Systems

TYPO3 CMS v10.0.0 - 10.4.54TYPO3 CMS v11.0.0 - 11.5.48TYPO3 CMS v12.0.0 - 12.4.40TYPO3 CMS v13.0.0 - 13.4.22TYPO3 CMS v14.0.0 - 14.0.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
TYPO3 CMS
TYPO3
>= 10.0.0, <= 10.4.5410.4.55
TYPO3 CMS
TYPO3
>= 11.0.0, <= 11.5.4811.5.49
TYPO3 CMS
TYPO3
>= 12.0.0, <= 12.4.4012.4.41
TYPO3 CMS
TYPO3
>= 13.0.0, <= 13.4.2213.4.23
TYPO3 CMS
TYPO3
>= 14.0.0, <= 14.0.114.0.2
AttributeDetail
CWE IDCWE-862
Attack VectorNetwork
CVSS 4.05.3 (Medium)
Privileges RequiredLow (Backend User)
EPSS Score0.00039
ImpactIntegrity / Phishing Risk
CWE-862
Missing Authorization

The application does not verify or incorrectly verifies that the user, or the process acting on behalf of the user, has authorization for a resource that is accessed.

Vulnerability Timeline

Vulnerability Reported by Georg Dümmler
2026-01-13
Patch Developed by Elias Häußler
2026-01-13
Public Disclosure & Advisory Release
2026-01-13