CVE-2025-59022

Trash Can Fire: How the TYPO3 Recycler Turned into a Data Shredder

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 13, 2026·7 min read·1 visit

Executive Summary (TL;DR)

The 'Recycler' (trash bin) in TYPO3 didn't check if you had permission to modify a specific table before letting you permanently delete records from it. It also got confused by records that were already 'soft-deleted,' effectively failing open on permission checks. Result: Low-privileged backend users could wipe out the entire site's database, including admin accounts and root pages.

A broken access control vulnerability in the TYPO3 CMS Recycler module allowed authenticated backend users to bypass table-level permissions and permanently delete arbitrary data. By exploiting logic flaws in how 'soft-deleted' records were handled, attackers could purge critical system tables, resulting in a catastrophic Denial of Service.

Fix Analysis (2)

Technical Appendix

CVSS Score
7.1/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Probability
0.04%
Top 89% most exploited

Affected Systems

TYPO3 CMS v14.0.0 - 14.0.1TYPO3 CMS v13.0.0 - 13.4.22TYPO3 CMS v12.0.0 - 12.4.40TYPO3 CMS v11.0.0 - 11.5.48TYPO3 CMS v10.0.0 - 10.4.54

Affected Versions Detail

Product
Affected Versions
Fixed Version
TYPO3 CMS
TYPO3
14.0.0 - 14.0.114.0.2
TYPO3 CMS
TYPO3
13.0.0 - 13.4.2213.4.23
TYPO3 CMS
TYPO3
12.0.0 - 12.4.4012.4.41
AttributeDetail
CWE IDCWE-862
Attack VectorNetwork (Ajax)
CVSS v4.07.1 (High)
ImpactHigh Availability Loss (Data Destruction)
Privileges RequiredLow (Authenticated Backend User)
Exploit StatusLogic Flaw (Trivial to Script)
VendorTYPO3
CWE-862
Missing Authorization

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

Vulnerability Timeline

Vendor Advisory Published
2026-01-13
Patches Released for v10-v14
2026-01-13
CVE-2025-59022 Assigned
2026-01-13

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.