Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6c46-p6j5-3f49 | TYPO3 CMS Allows Broken Access Control in Redirects Module |
Wed, 14 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 13 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Backend users with access to the redirects module and write permission on the sys_redirect table were able to read, create, and modify any redirect record without restriction to the user’s own file-mounts or web-mounts. This allowed attackers to insert or alter redirects pointing to arbitrary URLs – facilitating phishing or other malicious redirect attacks. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1. | |
| Title | TYPO3 CMS Allows Broken Access Control in Redirects Module | |
| First Time appeared |
Typo3
Typo3 typo3 |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Typo3
Typo3 typo3 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TYPO3
Published:
Updated: 2026-01-13T14:44:44.540Z
Reserved: 2025-09-07T19:01:20.436Z
Link: CVE-2025-59021
Updated: 2026-01-13T14:44:41.173Z
Status : Analyzed
Published: 2026-01-13T12:15:50.083
Modified: 2026-01-14T19:14:35.953
Link: CVE-2025-59021
No data.
OpenCVE Enrichment
No data.
Github GHSA