Skip to main content

CVE-2025-59013: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in TYPO3 TYPO3 CMS

Medium
VulnerabilityCVE-2025-59013cvecve-2025-59013cwe-601
Published: Tue Sep 09 2025 (09/09/2025, 09:00:23 UTC)
Source: CVE Database V5
Vendor/Project: TYPO3
Product: TYPO3 CMS

Description

An open‑redirect vulnerability in GeneralUtility::sanitizeLocalUrl of TYPO3 CMS 9.0.0–9.5.54, 10.0.0–10.4.53, 11.0.0–11.5.47, 12.0.0–12.4.36, and 13.0.0–13.4.17 allows an attacker to redirect users to arbitrary external sites, enabling phishing attacks by supplying a manipulated, sanitized URL.

AI-Powered Analysis

AILast updated: 09/09/2025, 09:06:46 UTC

Technical Analysis

CVE-2025-59013 is an open redirect vulnerability identified in the TYPO3 CMS platform, specifically within the GeneralUtility::sanitizeLocalUrl function. This vulnerability affects multiple major versions of TYPO3 CMS, ranging from 9.0.0 through 13.4.17. The flaw allows an attacker to craft a manipulated URL that bypasses the intended sanitization checks, enabling redirection of users to arbitrary external websites. Such open redirect vulnerabilities are commonly exploited in phishing campaigns, where attackers lure users into clicking seemingly legitimate links that ultimately redirect to malicious sites designed to steal credentials, deliver malware, or perform other fraudulent activities. The vulnerability does not require any authentication or privileges and can be exploited remotely by simply tricking users into clicking a malicious link. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity indirectly by facilitating phishing and social engineering attacks rather than direct system compromise. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet, indicating the need for immediate attention by TYPO3 administrators to monitor for updates and apply fixes once available.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on TYPO3 CMS for their web presence, including government portals, educational institutions, and private enterprises. Open redirect vulnerabilities can undermine user trust, damage brand reputation, and facilitate phishing attacks targeting employees or customers. Given the GDPR and other stringent data protection regulations in Europe, successful phishing campaigns leveraging this vulnerability could lead to unauthorized access to personal data, resulting in regulatory fines and legal consequences. Additionally, phishing attacks can serve as initial vectors for more sophisticated intrusions, including credential theft and lateral movement within corporate networks. Organizations with high public interaction websites or those in sectors like finance, healthcare, and public administration are particularly at risk, as attackers may exploit the vulnerability to target users with tailored phishing campaigns.

Mitigation Recommendations

Immediate mitigation steps include: 1) Monitoring TYPO3 CMS vendor communications and security advisories for official patches addressing CVE-2025-59013 and applying them promptly. 2) Implementing web application firewall (WAF) rules to detect and block suspicious URL parameters that attempt to redirect users externally. 3) Reviewing and restricting URL redirection logic within custom TYPO3 extensions or configurations to ensure only trusted internal URLs are allowed. 4) Educating users and administrators about the risks of phishing and the importance of verifying URLs before clicking. 5) Employing Content Security Policy (CSP) headers to limit the domains to which redirections and navigations can occur. 6) Conducting regular security assessments and penetration tests focusing on URL handling and redirection mechanisms within TYPO3 deployments. These measures, combined with timely patching, will reduce the risk of exploitation and limit the potential damage from phishing attacks leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TYPO3
Date Reserved
2025-09-07T19:01:20.435Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bfedc5a77866b25848a247

Added to database: 9/9/2025, 9:05:09 AM

Last enriched: 9/9/2025, 9:06:46 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats