Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. typo3/cms-extensionmanager
  4. ›
  5. CVE-2024-55921

CVE-2024-55921: TYPO3 Extension Manager Module vulnerable to Cross-Site Request Forgery

January 14, 2025

Problem

A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method.

Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions:

  • the user opens a malicious link, such as one sent via email.
  • the user visits a compromised or manipulated website while the following settings are misconfigured:
    • security.backend.enforceReferrer feature is disabled,
    • BE/cookieSameSite configuration is set to lax or none

The vulnerability in the affected downstream component “Extension Manager Module” allows attackers to retrieve and install 3rd party extensions from the TYPO3 Extension Repository - which can lead to remote code execution in the worst case.

Solution

Update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS that fix the problem described.

Credits

Thanks to Gabriel Dimitrov who reported this issue and to TYPO3 core and security members Benjamin Franzke, Oliver Hader, Andreas Kienast, Torben Hansen, Elias Häußler who fixed the issue.

References

  • TYPO3-CORE-SA-2025-006

References

  • github.com/TYPO3-CMS/extensionmanager
  • github.com/TYPO3-CMS/extensionmanager/commit/a5a58626dcb2af0c31bc6aec068e3d24e789b9e8
  • github.com/TYPO3/typo3/security/advisories/GHSA-4g52-pq8j-6qv5
  • github.com/advisories/GHSA-4g52-pq8j-6qv5
  • nvd.nist.gov/vuln/detail/CVE-2024-55921
  • typo3.org/security/advisory/typo3-core-sa-2025-006

Code Behaviors & Features

Detect and mitigate CVE-2024-55921 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.0.0 before 10.4.48, all versions starting from 11.0.0 before 11.5.42, all versions starting from 12.0.0 before 12.4.25, all versions starting from 13.0.0 before 13.4.3

Fixed versions

  • 10.4.48
  • 11.5.42
  • 12.4.25
  • 13.4.3

Solution

Upgrade to versions 10.4.48, 11.5.42, 12.4.25, 13.4.3 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)
  • CWE-749: Exposed Dangerous Method or Function

Source file

packagist/typo3/cms-extensionmanager/CVE-2024-55921.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:19 +0000.