CVE-2025-47936: CWE-918: Server-Side Request Forgery (SSRF) in TYPO3 typo3
TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, Webhooks are inherently vulnerable to Cross-Site Request Forgery (CSRF), which can be exploited by adversaries to target internal resources (e.g., localhost or other services on the local network). While this is not a vulnerability in TYPO3 itself, it may enable attackers to blindly access systems that would otherwise be inaccessible. An administrator-level backend user account is required to exploit this vulnerability. Users should update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to fix the problem.
AI Analysis
Technical Summary
CVE-2025-47936 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TYPO3 content management system, specifically affecting versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.12 LTS. TYPO3 is a widely used open-source PHP-based CMS. The vulnerability arises from the way TYPO3 handles webhooks, which are inherently vulnerable to Cross-Site Request Forgery (CSRF). This vulnerability allows an attacker with administrator-level backend access to exploit the webhook functionality to initiate unauthorized requests from the TYPO3 server to internal resources, such as localhost or other services within the local network. Although the vulnerability is not a direct flaw in TYPO3’s core, it enables attackers to perform SSRF attacks that can bypass network restrictions and access otherwise inaccessible internal systems. The exploitation requires high privileges (administrator backend user) and does not require user interaction beyond that. The CVSS v3.1 base score is 3.3, reflecting a low severity due to the high privilege requirement and limited impact scope. The vulnerability can lead to limited integrity and availability impacts by allowing attackers to send crafted requests to internal services, potentially disrupting operations or manipulating internal APIs. TYPO3 has addressed this issue in versions 12.4.31 LTS and 13.4.12 LTS, and users are strongly advised to upgrade to these or later versions to mitigate the risk.
Potential Impact
For European organizations using TYPO3 CMS, this vulnerability poses a moderate risk primarily in environments where administrator backend accounts may be compromised or misused. The SSRF capability could allow attackers to access internal network services that are not exposed externally, potentially leading to unauthorized information disclosure or disruption of internal services. Although the vulnerability requires administrator-level access, insider threats or compromised admin credentials could be leveraged to exploit this flaw. This could affect organizations relying on TYPO3 for public-facing websites or intranet portals, especially those with sensitive internal services behind firewalls. The impact on confidentiality is limited since the vulnerability does not directly disclose data but may enable further attacks. Integrity and availability impacts are possible if internal services are manipulated or disrupted. Given TYPO3’s popularity in European public sector, education, and enterprise environments, the vulnerability could have a tangible operational impact if left unpatched.
Mitigation Recommendations
1. Immediate upgrade to TYPO3 versions 12.4.31 LTS or 13.4.12 LTS or later to apply the official patch addressing this SSRF vulnerability. 2. Restrict and monitor administrator backend access rigorously, employing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Implement network segmentation and firewall rules to limit the TYPO3 server’s ability to initiate requests to sensitive internal services, thereby reducing the potential impact of SSRF exploitation. 4. Audit and review webhook configurations and usage within TYPO3 to ensure they do not expose unnecessary internal endpoints. 5. Monitor logs for unusual outbound requests originating from the TYPO3 server, which may indicate attempted exploitation. 6. Educate administrators on the risks of SSRF and the importance of safeguarding backend credentials. 7. Consider deploying Web Application Firewalls (WAF) with rules tuned to detect and block SSRF patterns related to TYPO3 webhook usage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Denmark, Austria, Switzerland, Italy
CVE-2025-47936: CWE-918: Server-Side Request Forgery (SSRF) in TYPO3 typo3
Description
TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, Webhooks are inherently vulnerable to Cross-Site Request Forgery (CSRF), which can be exploited by adversaries to target internal resources (e.g., localhost or other services on the local network). While this is not a vulnerability in TYPO3 itself, it may enable attackers to blindly access systems that would otherwise be inaccessible. An administrator-level backend user account is required to exploit this vulnerability. Users should update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to fix the problem.
AI-Powered Analysis
Technical Analysis
CVE-2025-47936 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TYPO3 content management system, specifically affecting versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.12 LTS. TYPO3 is a widely used open-source PHP-based CMS. The vulnerability arises from the way TYPO3 handles webhooks, which are inherently vulnerable to Cross-Site Request Forgery (CSRF). This vulnerability allows an attacker with administrator-level backend access to exploit the webhook functionality to initiate unauthorized requests from the TYPO3 server to internal resources, such as localhost or other services within the local network. Although the vulnerability is not a direct flaw in TYPO3’s core, it enables attackers to perform SSRF attacks that can bypass network restrictions and access otherwise inaccessible internal systems. The exploitation requires high privileges (administrator backend user) and does not require user interaction beyond that. The CVSS v3.1 base score is 3.3, reflecting a low severity due to the high privilege requirement and limited impact scope. The vulnerability can lead to limited integrity and availability impacts by allowing attackers to send crafted requests to internal services, potentially disrupting operations or manipulating internal APIs. TYPO3 has addressed this issue in versions 12.4.31 LTS and 13.4.12 LTS, and users are strongly advised to upgrade to these or later versions to mitigate the risk.
Potential Impact
For European organizations using TYPO3 CMS, this vulnerability poses a moderate risk primarily in environments where administrator backend accounts may be compromised or misused. The SSRF capability could allow attackers to access internal network services that are not exposed externally, potentially leading to unauthorized information disclosure or disruption of internal services. Although the vulnerability requires administrator-level access, insider threats or compromised admin credentials could be leveraged to exploit this flaw. This could affect organizations relying on TYPO3 for public-facing websites or intranet portals, especially those with sensitive internal services behind firewalls. The impact on confidentiality is limited since the vulnerability does not directly disclose data but may enable further attacks. Integrity and availability impacts are possible if internal services are manipulated or disrupted. Given TYPO3’s popularity in European public sector, education, and enterprise environments, the vulnerability could have a tangible operational impact if left unpatched.
Mitigation Recommendations
1. Immediate upgrade to TYPO3 versions 12.4.31 LTS or 13.4.12 LTS or later to apply the official patch addressing this SSRF vulnerability. 2. Restrict and monitor administrator backend access rigorously, employing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Implement network segmentation and firewall rules to limit the TYPO3 server’s ability to initiate requests to sensitive internal services, thereby reducing the potential impact of SSRF exploitation. 4. Audit and review webhook configurations and usage within TYPO3 to ensure they do not expose unnecessary internal endpoints. 5. Monitor logs for unusual outbound requests originating from the TYPO3 server, which may indicate attempted exploitation. 6. Educate administrators on the risks of SSRF and the importance of safeguarding backend credentials. 7. Consider deploying Web Application Firewalls (WAF) with rules tuned to detect and block SSRF patterns related to TYPO3 webhook usage.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-14T10:32:43.529Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeb0ed
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 12:28:23 PM
Last updated: 7/30/2025, 4:08:29 PM
Views: 14
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.