Arbitrary File Upload Affecting typo3/cms-core package, versions >=9.0.0, <12.4.31>=13.0.0, <13.4.12


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Upload vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-TYPO3CMSCORE-10188825
  • published22 May 2025
  • disclosed20 May 2025
  • creditHamed Kohi

Introduced: 20 May 2025

NewCVE-2025-47939  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

Upgrade typo3/cms-core to version 12.4.31, 13.4.12 or higher.

Overview

typo3/cms-core is a free open source enterprise content management system.

Affected versions of this package are vulnerable to Arbitrary File Upload via the file management module that allows to upload of any file type, except for those that are directly executable in a web server context. An attacker can introduce potentially harmful files that may disrupt third-party services such as antivirus scanners or malware detection systems, indirectly affecting the availability or reputation of the site.

Note: After upgrading, acceptable file extensions must be set via $GLOBALS['TYPO3_CONF_VARS']['SYS']['miscfile_ext'] and the security.system.enforceAllowedFileExtensions feature flag must be enabled to enforce it.

CVSS Base Scores

version 4.0
version 3.1