
Cloud Vulnerability DB
A community-led vulnerabilities database
An improper authentication vulnerability was discovered in TYPO3 Extension 'Modules' (codingms/modules). The vulnerability affects multiple versions: before 4.3.11, from 5.0.0 before 5.7.4, from 6.0.0 before 6.4.2, and from 7.0.0 before 7.5.5. The issue was disclosed on November 12, 2025, and was assigned CVE-2025-12998 (TYPO3 Advisory).
The vulnerability is classified as an Improper Authentication issue (CWE-287) with a CVSS v4.0 base score of 8.2 HIGH (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N). The core issue lies in the loginAsFrontendUser function within Classes/Utility/FrontendUserUtility.php. The function failed to properly verify backend user authentication when the setting 'module.frontendUser.allowNonAdminUsersToLoginAsFrontendUser' was enabled (Miggo Analysis).
When exploited, this vulnerability allows unauthenticated remote users to bypass authentication controls and login as any frontend user in the system. This could lead to unauthorized access to user accounts and potential exposure of sensitive information (TYPO3 Advisory).
The vulnerability has been patched in versions 4.3.11, 5.7.4, 6.4.2, and 7.5.5. Users are strongly advised to update to these versions immediately. The updates are available through the TYPO3 extension manager, packagist, and official download links (TYPO3 Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."