{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59020","assignerOrgId":"f4fb688c-4412-4426-b4b8-421ecf27b14a","state":"PUBLISHED","assignerShortName":"TYPO3","dateReserved":"2025-09-07T19:01:20.436Z","datePublished":"2026-01-13T11:53:02.274Z","dateUpdated":"2026-01-13T16:43:00.776Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://packagist.org","defaultStatus":"unaffected","modules":["Backend"],"packageName":"typo3/cms-backend","product":"TYPO3 CMS","repo":"https://github.com/TYPO3/typo3","vendor":"TYPO3","versions":[{"lessThan":"10.4.55","status":"affected","version":"10.0.0","versionType":"semver"},{"lessThan":"11.5.49","status":"affected","version":"11.0.0","versionType":"semver"},{"lessThan":"12.4.41","status":"affected","version":"12.0.0","versionType":"semver"},{"lessThan":"13.4.23","status":"affected","version":"13.0.0","versionType":"semver"},{"lessThan":"14.0.2","status":"affected","version":"14.0.0","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"10.4.55","versionStartIncluding":"10.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"11.5.49","versionStartIncluding":"11.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"12.4.41","versionStartIncluding":"12.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"13.4.23","versionStartIncluding":"13.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"14.0.2","versionStartIncluding":"14.0.0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"AND"}],"credits":[{"lang":"en","type":"reporter","value":"Daniel Windloff"},{"lang":"en","type":"remediation developer","value":"Benjamin Franzke"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"By exploiting the <code>defVals</code> parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1."}],"value":"By exploiting the defVals parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.3,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f4fb688c-4412-4426-b4b8-421ecf27b14a","shortName":"TYPO3","dateUpdated":"2026-01-13T11:53:02.274Z"},"references":[{"tags":["vendor-advisory"],"url":"https://typo3.org/security/advisory/typo3-core-sa-2026-001"},{"name":"Git commit of main branch","tags":["patch"],"url":"https://github.com/TYPO3/typo3/commit/ac3f792bd5ab7c58153fc1075cb9e001c9cebe3b"},{"name":"Git commit of 13.4 branch","tags":["patch"],"url":"https://github.com/TYPO3/typo3/commit/fb98378a8fd30dd50d89a3d1a420780819f38232"},{"name":"Git commit of 12.4 branch","tags":["patch"],"url":"https://github.com/TYPO3/typo3/commit/cd11a19958d823d12d028f9345b41739c7e70118"}],"source":{"discovery":"UNKNOWN"},"title":"TYPO3 CMS Allows Broken Access Control in Edit Document Controller","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-13T16:42:25.076806Z","id":"CVE-2025-59020","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-13T16:43:00.776Z"}}]}}