Skip to main content

CVE-2025-48201: CWE-425 Direct Request ('Forced Browsing') in TYPO3 ns backup extension

High
VulnerabilityCVE-2025-48201cvecve-2025-48201cwe-425
Published: Wed May 21 2025 (05/21/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: TYPO3
Product: ns backup extension

Description

The ns_backup extension through 13.0.0 for TYPO3 has a Predictable Resource Location.

AI-Powered Analysis

AILast updated: 07/07/2025, 12:44:09 UTC

Technical Analysis

CVE-2025-48201 is a high-severity vulnerability identified in the ns_backup extension for TYPO3, a widely used open-source content management system (CMS). The vulnerability is classified under CWE-425, which corresponds to Direct Request or Forced Browsing attacks. Specifically, the ns_backup extension up to version 13.0.0 suffers from a predictable resource location issue. This means that certain backup files or resources managed by the extension can be accessed directly by an attacker without proper authorization checks, simply by guessing or enumerating URLs. The CVSS v3.1 score of 8.6 (High) reflects the vulnerability's characteristics: it is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability are not impacted (I:N, A:N). This suggests that attackers can access sensitive backup data, potentially exposing confidential information stored within TYPO3 sites using the ns_backup extension. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that remediation may still be pending or in progress. The vulnerability's root cause lies in the extension's failure to enforce access controls on backup files, allowing unauthorized direct requests to retrieve sensitive data.

Potential Impact

For European organizations using TYPO3 CMS with the ns_backup extension, this vulnerability poses a significant risk to the confidentiality of their data. Backup files often contain sensitive information, including database dumps, configuration files, and potentially user data. Unauthorized access to these backups could lead to data breaches, exposing personal data protected under GDPR, intellectual property, or internal business information. This could result in regulatory penalties, reputational damage, and loss of customer trust. Since TYPO3 is popular among public sector entities, educational institutions, and enterprises in Europe, the impact could be widespread. The vulnerability does not affect integrity or availability directly, but the confidentiality breach alone is critical. Attackers exploiting this flaw could conduct reconnaissance or prepare for further attacks by analyzing backup contents. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers, increasing the threat level.

Mitigation Recommendations

European organizations should immediately audit their TYPO3 installations to determine if the ns_backup extension is in use and identify the version deployed. Until an official patch is released, organizations should consider disabling the ns_backup extension or restricting access to backup resources via web server configuration (e.g., using .htaccess rules or equivalent to block direct URL access to backup files). Implementing strict access controls at the web server or application firewall level to prevent unauthorized requests to backup URLs is critical. Monitoring web server logs for unusual access patterns targeting backup file paths can help detect exploitation attempts. Organizations should also ensure that backups are stored securely outside the web root and are not publicly accessible. Once a patch becomes available, prompt application of updates is essential. Additionally, reviewing and tightening overall TYPO3 CMS security configurations, including user permissions and extension management, will reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-17T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc06557

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 7/7/2025, 12:44:09 PM

Last updated: 7/30/2025, 7:57:10 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats