{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T05:39:14.947","vulnerabilities":[{"cve":{"id":"CVE-2025-47941","sourceIdentifier":"security-advisories@github.com","published":"2025-05-20T14:15:51.093","lastModified":"2025-09-03T17:22:00.347","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TYPO3 is an open source, PHP based web content management system. In versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, the multifactor authentication (MFA) dialog presented during backend login can be bypassed due to insufficient enforcement of access restrictions on all backend routes. Successful exploitation requires valid backend user credentials, as MFA can only be bypassed after successful authentication. Users should update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to fix the problem."},{"lang":"es","value":"TYPO3 es un sistema de gestión de contenido web de código abierto basado en PHP. En las versiones de la rama 12.x anteriores a la 12.4.31 LTS y de la rama 13.x anteriores a la 13.4.2 LTS, el cuadro de diálogo de autenticación multifactor (MFA) que se muestra al iniciar sesión en el backend puede omitirse debido a una aplicación insuficiente de las restricciones de acceso en todas las rutas del backend. Para una explotación exitosa, se requieren credenciales de usuario válidas del backend, ya que la MFA solo puede omitirse tras una autenticación exitosa. Los usuarios deben actualizar a la versión 12.4.31 LTS o 13.4.12 LTS de TYPO3 para solucionar el problema.\n"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.4.31","matchCriteriaId":"05F9DC80-7BBC-42A0-800E-EF90CA604C7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.4.12","matchCriteriaId":"10E529B8-AA31-4603-800C-39AF3CCBA1E7"}]}]}],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-744g-7qm9-hjh9","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://typo3.org/security/advisory/typo3-core-sa-2025-015","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}