CVE-2025-47939
May 20, 2025
TYPO3 is an open source, PHP based web content management system. By design, the file management module in TYPO3’s backend user interface has historically allowed the upload of any file type, with the exception of those that are directly executable in a web server context. This lack of restriction means it is possible to upload files that may be considered potentially harmful, such as executable binaries (e.g., ".exe" files), or files with inconsistent file extensions and MIME types (for example, a file incorrectly named with a ".png" extension but actually carrying the MIME type "application/zip") starting in version 9.0.0 and prior to versions 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, and 13.4.12 LTS. Although such files are not directly executable through the web server, their presence can introduce indirect risks. For example, third-party services such as antivirus scanners or malware detection systems might flag or block access to the website for end users if suspicious files are found. This could negatively affect the availability or reputation of the site. Users should update to TYPO3 version 9.5.51 ELTS, 10.4.50 ELTS, 11.5.44 ELTS, 12.4.31 LTS, or 13.4.12 LTS to fix the problem.
Affected Packages
https://github.com/TYPO3-CMS/core.git (GITHUB):
Affected version(s) >=v9.0.0 <v9.5.51Fix Suggestion:
Update to version v9.5.51https://github.com/TYPO3-CMS/core.git (GITHUB):
Affected version(s) >=v12.0.0 <v12.4.31Fix Suggestion:
Update to version v12.4.31https://github.com/TYPO3-CMS/core.git (GITHUB):
Affected version(s) >=v10.0.0 <v10.4.50Fix Suggestion:
Update to version v10.4.50https://github.com/TYPO3-CMS/core.git (GITHUB):
Affected version(s) >=v13.0.0 <v13.4.12Fix Suggestion:
Update to version v13.4.12https://github.com/TYPO3-CMS/core.git (GITHUB):
Affected version(s) >=v11.0.0 <v11.5.44Fix Suggestion:
Update to version v11.5.44Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
EPSS
Base Score:
0.04