We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47941

TYPO3 Has Broken Authentication in Backend MFA



Description

TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, the multifactor authentication (MFA) dialog presented during backend login can be bypassed due to insufficient enforcement of access restrictions on all backend routes. Successful exploitation requires valid backend user credentials, as MFA can only be bypassed after successful authentication. Users should update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to fix the problem.

Reserved 2025-05-14 | Published 2025-05-20 | Updated 2025-05-20 | Assigner GitHub_M


HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

>= 12.0.0, < 12.4.31
affected

>= 13.0.0, < 13.4.12
affected

References

github.com/.../typo3/security/advisories/GHSA-744g-7qm9-hjh9

typo3.org/security/advisory/typo3-core-sa-2025-015

cve.org (CVE-2025-47941)

nvd.nist.gov (CVE-2025-47941)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47941

Support options

Helpdesk Chat, Email, Knowledgebase