Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59022: CWE-862 Missing Authorization in TYPO3 TYPO3 CMS

0
High
VulnerabilityCVE-2025-59022cvecve-2025-59022cwe-862
Published: Tue Jan 13 2026 (01/13/2026, 11:53:45 UTC)
Source: CVE Database V5
Vendor/Project: TYPO3
Product: TYPO3 CMS

Description

Backend users who had access to the recycler module could delete arbitrary data from any database table defined in the TCA - regardless of whether they had permission to that particular table. This allowed attackers to purge and destroy critical site data, effectively rendering the website unavailable. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.

AI-Powered Analysis

AILast updated: 01/13/2026, 12:25:51 UTC

Technical Analysis

CVE-2025-59022 is a missing authorization vulnerability (CWE-862) in the TYPO3 CMS recycler module. The recycler module is intended to allow backend users to delete data, but due to improper authorization checks, any backend user with access to this module can delete data from any database table defined in the TYPO3 Configuration Array (TCA), regardless of their specific permissions for those tables. This means that users can bypass intended access controls and purge critical data across the CMS database, potentially destroying content, configuration, or user data. The vulnerability affects multiple major TYPO3 CMS versions from 10.0.0 through 14.0.1, covering a broad range of currently supported releases. Exploitation requires only backend user privileges, which are typically granted to site administrators or editors, but no further authentication or user interaction is needed. The CVSS 4.0 base score is 7.1 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond backend user access, and a high impact on availability. No known public exploits have been reported yet, but the vulnerability poses a significant risk of data destruction and site unavailability. TYPO3 CMS is a popular open-source content management system used by many European organizations, especially in government, education, and enterprise sectors, making this vulnerability particularly relevant in those contexts.

Potential Impact

For European organizations using TYPO3 CMS, this vulnerability can lead to severe operational disruption. Attackers or malicious insiders with backend access can delete critical site data, causing loss of content, configuration, and potentially user information. This can result in website downtime, loss of public trust, and costly recovery efforts. Public sector entities relying on TYPO3 for citizen-facing portals are especially at risk, as service unavailability can impact government operations and citizen services. Enterprises using TYPO3 for e-commerce or internal portals may face financial losses and reputational damage. The broad range of affected TYPO3 versions means many organizations may be vulnerable if they have not applied updates. Since exploitation requires only backend user access, compromised or malicious internal accounts significantly increase risk. The lack of user interaction or complex exploitation steps means attacks could be automated or performed quickly once access is obtained. Overall, the vulnerability threatens confidentiality (due to unauthorized data access), integrity (due to data deletion), and availability (due to site disruption), with availability impact being the most critical.

Mitigation Recommendations

Organizations should immediately audit backend user permissions and restrict access to the recycler module to only the most trusted administrators. If possible, disable the recycler module temporarily until patches are applied. TYPO3 CMS maintainers should be monitored for official patches or updates addressing CVE-2025-59022, and these should be applied promptly across all affected versions. Implement strict backend user account management, including multi-factor authentication and regular credential reviews, to reduce the risk of compromised accounts. Enable detailed logging and monitoring of deletion activities within the CMS to detect suspicious behavior early. Consider network segmentation and access controls to limit backend access to trusted networks and personnel. Backup strategies should be reviewed and tested to ensure rapid recovery from data deletion incidents. Finally, educate administrators about the risks of this vulnerability and the importance of limiting backend module access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TYPO3
Date Reserved
2025-09-07T19:01:20.436Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69663672a60475309fe49821

Added to database: 1/13/2026, 12:11:30 PM

Last enriched: 1/13/2026, 12:25:51 PM

Last updated: 1/13/2026, 3:04:14 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats