The vulnerability is a broken access control issue in the TYPO3 CMS recycler module. The root cause is a failure to properly authorize record deletion requests. The exploitation flow starts in TYPO3\CMS\Recycler\Controller\RecyclerAjaxController::dispatch, where the deleteRecords action did not verify if the user had the necessary permissions to delete records. This allowed any authenticated backend user with access to the recycler module to proceed. The request is then passed to TYPO3\CMS\Recycler\Domain\Model\DeletedRecords::deleteData, which iterates over the records to be deleted. Crucially, this function called the low-level TYPO3\CMS\Core\DataHandling\DataHandler::deleteAction (or deleteEl) method with the $noRecordCheck parameter set to true. This flag intentionally disables all permission and ownership checks within the DataHandler, leading to the broken access control. As a result, an attacker could permanently delete arbitrary data from any database table, potentially causing a complete denial of service by destroying critical site data. The patches address this by adding permission checks in the RecyclerAjaxController and by changing the call in DeletedRecords to ensure the DataHandler's permission checks are not bypassed.