TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\CMS\Core\Http\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr | Vendor Advisory |
https://typo3.org/security/advisory/typo3-core-sa-2025-002 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* | |
First Time |
Typo3 typo3
Typo3 |
|
References | () https://github.com/TYPO3/typo3/security/advisories/GHSA-2fx5-pggv-6jjr - Vendor Advisory | |
References | () https://typo3.org/security/advisory/typo3-core-sa-2025-002 - Vendor Advisory | |
Summary |
|
14 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 20:15
Updated : 2025-08-26 18:55
NVD link : CVE-2024-55892
Mitre link : CVE-2024-55892
CVE.ORG link : CVE-2024-55892
JSON object : View
Products Affected
typo3
- typo3
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')