Skip to main content

CVE-2024-55893: CWE-352: Cross-Site Request Forgery (CSRF) in TYPO3 typo3

Medium
VulnerabilityCVE-2024-55893cvecve-2024-55893cwe-352cwe-749
Published: Tue Jan 14 2025 (01/14/2025, 20:00:15 UTC)
Source: CVE
Vendor/Project: TYPO3
Product: typo3

Description

TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Log Module” allows attackers to remove log entries. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 08:40:08 UTC

Technical Analysis

CVE-2024-55893 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the backend user interface of TYPO3, a widely used open-source Content Management Framework. The vulnerability arises due to improper enforcement of HTTP methods and insufficient CSRF protections in backend components, particularly involving deep link functionality and downstream modules such as the Log Module. Specifically, state-changing actions incorrectly accept HTTP GET requests without verifying the request's origin or enforcing stricter HTTP methods like POST. This flaw allows an attacker to craft malicious URLs that, when visited by an authenticated backend user, can trigger unauthorized actions such as deletion of log entries. Successful exploitation requires the victim to have an active backend session and to be tricked into clicking a malicious link or visiting a compromised website. The risk is exacerbated if certain TYPO3 security settings are misconfigured: if the `security.backend.enforceReferrer` feature is disabled and the `BE/cookieSameSite` attribute is set to lax or none, the CSRF protections are weakened, increasing attack feasibility. TYPO3 versions prior to 10.4.48, 11.5.42, 12.4.25, and 13.4.3 are affected. The vulnerability has a CVSS 3.1 base score of 4.3 (medium severity), reflecting that exploitation requires user interaction but can lead to integrity loss by unauthorized modification of backend data (e.g., log deletion). There are no known workarounds, and users are strongly advised to upgrade to the fixed versions. No known exploits are currently reported in the wild. This vulnerability highlights the importance of strict HTTP method enforcement and CSRF protections in web application backends, especially for administrative interfaces.

Potential Impact

For European organizations using TYPO3 as their content management framework, this vulnerability poses a moderate risk primarily to the integrity of backend data and audit trails. Attackers exploiting this flaw could delete or manipulate log entries, potentially covering tracks of malicious activities or disrupting incident response processes. While confidentiality and availability impacts are minimal, the integrity compromise can hinder forensic investigations and compliance with regulatory requirements such as GDPR, which mandates accurate logging and auditability. Since exploitation requires an authenticated backend user to be tricked into clicking a malicious link, the threat is more significant in environments where backend users have elevated privileges and where security awareness is low. The lack of known exploits reduces immediate risk, but the vulnerability's presence in multiple TYPO3 LTS versions means many European public sector, educational, and private organizations relying on TYPO3 could be affected if they do not patch promptly. Misconfiguration of security settings common in some deployments further increases exposure. Overall, the impact is moderate but non-negligible, especially for organizations with strict compliance and audit requirements.

Mitigation Recommendations

1. Immediate upgrade to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, or 13.4.3 LTS, or later, as these contain the official patches addressing the CSRF vulnerability. 2. Review and enforce backend security configurations: enable `security.backend.enforceReferrer` to ensure requests originate from trusted sources and set `BE/cookieSameSite` to 'strict' to prevent cookies from being sent with cross-site requests. 3. Conduct a thorough audit of backend user privileges to minimize the number of users with access to sensitive backend functions, reducing the attack surface. 4. Implement user training and awareness programs to reduce the risk of users clicking on malicious links, emphasizing phishing and social engineering risks. 5. Monitor backend logs for suspicious activities, especially unexpected deletions or modifications of log entries, and consider implementing additional logging mechanisms external to TYPO3 to maintain audit integrity. 6. If immediate patching is not feasible, restrict backend access via network controls such as VPNs or IP whitelisting to limit exposure to potentially malicious external sites. 7. Regularly review and update security policies to ensure best practices in web application security, including CSRF protections and HTTP method enforcement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-12-12T15:03:39.206Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac89

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 8:40:08 AM

Last updated: 7/30/2025, 7:15:55 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats