CVE-2025-48201: CWE-425 Direct Request ('Forced Browsing') in TYPO3 ns backup extension
The ns_backup extension through 13.0.0 for TYPO3 has a Predictable Resource Location.
AI Analysis
Technical Summary
CVE-2025-48201 is a high-severity vulnerability identified in the ns_backup extension for TYPO3, a widely used open-source content management system (CMS). The vulnerability is classified under CWE-425, which corresponds to Direct Request or Forced Browsing attacks. Specifically, the ns_backup extension up to version 13.0.0 suffers from a predictable resource location issue. This means that certain backup files or resources managed by the extension can be accessed directly by an attacker without proper authorization checks, simply by guessing or enumerating URLs. The CVSS v3.1 score of 8.6 (High) reflects the vulnerability's characteristics: it is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability are not impacted (I:N, A:N). This suggests that attackers can access sensitive backup data, potentially exposing confidential information stored within TYPO3 sites using the ns_backup extension. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that remediation may still be pending or in progress. The vulnerability's root cause lies in the extension's failure to enforce access controls on backup files, allowing unauthorized direct requests to retrieve sensitive data.
Potential Impact
For European organizations using TYPO3 CMS with the ns_backup extension, this vulnerability poses a significant risk to the confidentiality of their data. Backup files often contain sensitive information, including database dumps, configuration files, and potentially user data. Unauthorized access to these backups could lead to data breaches, exposing personal data protected under GDPR, intellectual property, or internal business information. This could result in regulatory penalties, reputational damage, and loss of customer trust. Since TYPO3 is popular among public sector entities, educational institutions, and enterprises in Europe, the impact could be widespread. The vulnerability does not affect integrity or availability directly, but the confidentiality breach alone is critical. Attackers exploiting this flaw could conduct reconnaissance or prepare for further attacks by analyzing backup contents. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers, increasing the threat level.
Mitigation Recommendations
European organizations should immediately audit their TYPO3 installations to determine if the ns_backup extension is in use and identify the version deployed. Until an official patch is released, organizations should consider disabling the ns_backup extension or restricting access to backup resources via web server configuration (e.g., using .htaccess rules or equivalent to block direct URL access to backup files). Implementing strict access controls at the web server or application firewall level to prevent unauthorized requests to backup URLs is critical. Monitoring web server logs for unusual access patterns targeting backup file paths can help detect exploitation attempts. Organizations should also ensure that backups are stored securely outside the web root and are not publicly accessible. Once a patch becomes available, prompt application of updates is essential. Additionally, reviewing and tightening overall TYPO3 CMS security configurations, including user permissions and extension management, will reduce the attack surface.
Affected Countries
Germany, France, Netherlands, Belgium, Sweden, Denmark, Austria, Switzerland, United Kingdom
CVE-2025-48201: CWE-425 Direct Request ('Forced Browsing') in TYPO3 ns backup extension
Description
The ns_backup extension through 13.0.0 for TYPO3 has a Predictable Resource Location.
AI-Powered Analysis
Technical Analysis
CVE-2025-48201 is a high-severity vulnerability identified in the ns_backup extension for TYPO3, a widely used open-source content management system (CMS). The vulnerability is classified under CWE-425, which corresponds to Direct Request or Forced Browsing attacks. Specifically, the ns_backup extension up to version 13.0.0 suffers from a predictable resource location issue. This means that certain backup files or resources managed by the extension can be accessed directly by an attacker without proper authorization checks, simply by guessing or enumerating URLs. The CVSS v3.1 score of 8.6 (High) reflects the vulnerability's characteristics: it is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability are not impacted (I:N, A:N). This suggests that attackers can access sensitive backup data, potentially exposing confidential information stored within TYPO3 sites using the ns_backup extension. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that remediation may still be pending or in progress. The vulnerability's root cause lies in the extension's failure to enforce access controls on backup files, allowing unauthorized direct requests to retrieve sensitive data.
Potential Impact
For European organizations using TYPO3 CMS with the ns_backup extension, this vulnerability poses a significant risk to the confidentiality of their data. Backup files often contain sensitive information, including database dumps, configuration files, and potentially user data. Unauthorized access to these backups could lead to data breaches, exposing personal data protected under GDPR, intellectual property, or internal business information. This could result in regulatory penalties, reputational damage, and loss of customer trust. Since TYPO3 is popular among public sector entities, educational institutions, and enterprises in Europe, the impact could be widespread. The vulnerability does not affect integrity or availability directly, but the confidentiality breach alone is critical. Attackers exploiting this flaw could conduct reconnaissance or prepare for further attacks by analyzing backup contents. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers, increasing the threat level.
Mitigation Recommendations
European organizations should immediately audit their TYPO3 installations to determine if the ns_backup extension is in use and identify the version deployed. Until an official patch is released, organizations should consider disabling the ns_backup extension or restricting access to backup resources via web server configuration (e.g., using .htaccess rules or equivalent to block direct URL access to backup files). Implementing strict access controls at the web server or application firewall level to prevent unauthorized requests to backup URLs is critical. Monitoring web server logs for unusual access patterns targeting backup file paths can help detect exploitation attempts. Organizations should also ensure that backups are stored securely outside the web root and are not publicly accessible. Once a patch becomes available, prompt application of updates is essential. Additionally, reviewing and tightening overall TYPO3 CMS security configurations, including user permissions and extension management, will reduce the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-17T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682df35bc4522896dcc06557
Added to database: 5/21/2025, 3:38:03 PM
Last enriched: 7/7/2025, 12:44:09 PM
Last updated: 7/30/2025, 7:57:10 PM
Views: 13
Related Threats
CVE-2025-6572: CWE-79 Cross-Site Scripting (XSS) in OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer)
HighCVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54940: Code injection in WPEngine, Inc. Advanced Custom Fields
LowCVE-2025-8708: Deserialization in Antabot White-Jotter
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.