Skip to main content

CVE-2025-10316: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in TYPO3 Extension "Form to Database" (form_to_database)

Low
VulnerabilityCVE-2025-10316cvecve-2025-10316cwe-79
Published: Tue Sep 16 2025 (09/16/2025, 09:09:33 UTC)
Source: CVE Database V5
Vendor/Project: TYPO3
Product: Extension "Form to Database" (form_to_database)

Description

The extension "Form to Database" is susceptible to Cross-Site Scripting. This issue affects the following versions: before 2.2.5, from 3.0.0 before 3.2.2, from 4.0.0 before 4.2.3, from 5.0.0 before 5.0.2.

AI-Powered Analysis

AILast updated: 09/16/2025, 19:29:00 UTC

Technical Analysis

CVE-2025-10316 is a Cross-Site Scripting (XSS) vulnerability identified in the TYPO3 CMS extension "Form to Database" (form_to_database). This extension is designed to capture form submissions and store them directly into a database. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the extension fails to adequately sanitize or encode input fields before rendering them in the web interface, allowing an attacker to inject malicious scripts. The affected versions include all releases before 2.2.5, versions from 3.0.0 up to but not including 3.2.2, from 4.0.0 up to 4.2.3, and from 5.0.0 up to 5.0.2. The CVSS 4.0 base score is 2.3, indicating a low severity primarily because exploitation requires user interaction and authentication, and the impact on confidentiality, integrity, and availability is limited. The attack vector is network-based with low attack complexity, but the vulnerability requires the victim to interact with a crafted input or link. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. However, the presence of this vulnerability in a widely used CMS extension poses a risk of session hijacking, defacement, or redirection to malicious sites if exploited. TYPO3 administrators should be aware of this issue and monitor for updates or mitigations.

Potential Impact

For European organizations using TYPO3 CMS with the "Form to Database" extension, this vulnerability could lead to targeted XSS attacks that compromise user sessions, steal credentials, or execute unauthorized actions within the context of the affected website. Although the CVSS score is low, the impact on confidentiality and integrity can be significant if attackers leverage the vulnerability to escalate privileges or pivot within the network. Public-facing websites, especially those handling sensitive user data or providing critical services, could be exploited to deliver malware or phishing campaigns. The requirement for user interaction and authentication limits mass exploitation but does not eliminate risk, particularly for organizations with high user engagement or internal TYPO3 portals. Additionally, the lack of patches at the time of disclosure necessitates immediate risk assessment and temporary mitigations. The reputational damage and potential regulatory implications under GDPR for data breaches caused by such attacks also elevate the impact for European entities.

Mitigation Recommendations

1. Immediate mitigation involves disabling or removing the "Form to Database" extension if it is not essential to operations. 2. Restrict access to TYPO3 backend and form submission interfaces using IP whitelisting and strong authentication mechanisms such as multi-factor authentication (MFA). 3. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 4. Sanitize and validate all user inputs at both client and server sides, applying strict whitelisting of allowed characters and encoding outputs before rendering. 5. Monitor TYPO3 community channels and vendor advisories closely for official patches or updates addressing this vulnerability and apply them promptly. 6. Conduct security awareness training for users to recognize suspicious links or inputs that could trigger XSS attacks. 7. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting TYPO3 extensions. 8. Regularly audit and review installed TYPO3 extensions for security posture and remove or replace outdated or vulnerable components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TYPO3
Date Reserved
2025-09-12T06:42:30.873Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c9ba513e540f592ae59bb6

Added to database: 9/16/2025, 7:28:17 PM

Last enriched: 9/16/2025, 7:29:00 PM

Last updated: 9/19/2025, 11:08:14 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats