Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4202: CWE-862 in TYPO3 Extension "Redirect Tabs"

0
Low
VulnerabilityCVE-2026-4202cvecve-2026-4202cwe-862cwe-200
Published: Tue Mar 17 2026 (03/17/2026, 08:33:40 UTC)
Source: CVE Database V5
Vendor/Project: TYPO3
Product: Extension "Redirect Tabs"

Description

CVE-2026-4202 is a low-severity vulnerability in the TYPO3 CMS extension "Redirect Tabs" that arises from improper authorization checks. Authenticated users with limited privileges can access redirect records when editing pages without having the necessary permissions. This exposure could lead to unauthorized disclosure of redirect configurations but does not allow modification or broader system compromise. The vulnerability affects versions 0, 3. 0. 0, and 4. 0. 0 of the extension. Exploitation requires authenticated access but no user interaction beyond that. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 03/17/2026, 09:12:56 UTC

Technical Analysis

CVE-2026-4202 is a vulnerability classified under CWE-862 (Missing Authorization) found in the TYPO3 CMS extension "Redirect Tabs." The issue stems from the extension's failure to properly verify whether an authenticated user has the appropriate permissions to access redirect records during page editing operations. As a result, users with limited privileges can view redirect configurations they should not be authorized to see. The affected versions include 0, 3.0.0, and 4.0.0 of the extension. The vulnerability does not require user interaction beyond authentication and has a CVSS 4.0 base score of 2.3, indicating low severity. The attack vector is network-based with low complexity, requiring privileges but no additional user interaction. The impact is limited to confidentiality, with no integrity or availability effects reported. No patches or known exploits are currently available, and the vulnerability was publicly disclosed on March 17, 2026. This issue highlights the importance of robust authorization checks in CMS extensions to prevent unauthorized data exposure.

Potential Impact

The primary impact of CVE-2026-4202 is unauthorized disclosure of redirect records within TYPO3 CMS installations using the vulnerable "Redirect Tabs" extension. While the confidentiality of redirect configurations is compromised, the vulnerability does not allow attackers to modify redirects, escalate privileges, or disrupt service availability. This exposure could aid attackers in reconnaissance by revealing internal redirect structures, potentially facilitating further targeted attacks or social engineering. Organizations relying on TYPO3 for content management and using this extension may face risks related to information leakage, especially if redirect data contains sensitive URLs or internal routing logic. However, the low CVSS score and requirement for authenticated access limit the overall risk. The absence of known exploits reduces immediate threat but does not eliminate the need for remediation. In environments with many users or complex permission schemes, the risk of unauthorized access to redirect data is more pronounced.

Mitigation Recommendations

To mitigate CVE-2026-4202, organizations should first verify and restrict user permissions within TYPO3 to ensure that only authorized users can access redirect management features. Administrators should audit roles and privileges associated with the "Redirect Tabs" extension and remove unnecessary access rights. Until an official patch is released, consider disabling the extension if redirect management is not critical or isolating its use to trusted administrators. Monitor TYPO3 security advisories for updates or patches addressing this vulnerability and apply them promptly. Implement logging and alerting on access to redirect records to detect potential unauthorized access attempts. Additionally, conduct regular security reviews of all CMS extensions to ensure proper authorization controls are in place. Employ network segmentation and access controls to limit exposure of the TYPO3 backend to trusted networks and users only.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TYPO3
Date Reserved
2026-03-15T10:57:58.870Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b917ad771bdb17498cd9da

Added to database: 3/17/2026, 8:58:21 AM

Last enriched: 3/17/2026, 9:12:56 AM

Last updated: 3/17/2026, 11:09:25 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses