CVE-2024-55945: TYPO3 DB Check Module vulnerable to Cross-Site Request Forgery
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.05589%
CWE
Published
1/14/2025
Updated
1/14/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
typo3/cms-lowlevel | composer | >= 11.0.0, <= 11.5.41 | 11.5.42 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on state-changing actions in the DB Check Module (ext:lowlevel) accepting HTTP
GET requests without CSRF protection. TYPO3
backend controllers typically implement actions via Extbase
, where methods like checkAction
and fixAction
would handle database operations. The CWE-749
(exposed dangerous methods) and CWE-352
(CSRF) align with these functions if they lack HTTP
method enforcement (@TYPO3\CMS\Extbase\Annotation\IgnoreValidation
is insufficient) and CSRF token validation. The DatabaseIntegrityController
is the logical component for these operations, and the vulnerability description explicitly references improper HTTP
method handling in downstream components.