CVE-2025-47941
PHP vulnerability analysis and mitigation

Overview

TYPO3, an open source PHP-based web content management system, was found to contain a significant authentication vulnerability (CVE-2025-47941) discovered and disclosed on May 20, 2025. The vulnerability affects versions on the 12.x branch prior to 12.4.31 LTS and the 13.x branch prior to 13.4.2 LTS, allowing attackers to bypass the multifactor authentication (MFA) dialog during backend login (TYPO3 Advisory, GitHub Advisory).

Technical details

The vulnerability is classified as a broken authentication issue (CWE-288) with a CVSS v3.1 base score of 7.2 (High). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The scope is unchanged (S:U) with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H) (GitHub Advisory).

Impact

The vulnerability allows attackers to bypass the multifactor authentication mechanism in TYPO3's backend, potentially gaining unauthorized access to administrative functions. While the impact is significant, it's important to note that successful exploitation requires valid backend user credentials, as the MFA bypass only works after initial authentication (TYPO3 Advisory).

Mitigation and workarounds

Users are strongly advised to update to TYPO3 version 12.4.31 LTS or 13.4.12 LTS to address this vulnerability. These patched versions implement proper enforcement of access restrictions on backend routes, effectively preventing the MFA bypass (TYPO3 Advisory).

Community reactions

The vulnerability was responsibly disclosed and addressed through the collaborative efforts of security researchers Jens Jacobsen and Y. Kahveci, who reported the issue, and TYPO3 security team member Torben Hansen, who implemented the fix (TYPO3 Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23492HIGH8.8
  • PHPPHP
  • pimcore/pimcore
NoYesJan 14, 2026
CVE-2026-23498HIGH7.2
  • PHPPHP
  • shopware/core
NoYesJan 14, 2026
GHSA-595p-g7xc-c333MEDIUM6.9
  • PHPPHP
  • algolia/algoliasearch-magento-2
NoYesJan 14, 2026
CVE-2022-50807MEDIUM6.9
  • PHPPHP
  • concrete5/concrete5
NoNoJan 13, 2026
CVE-2026-0859MEDIUM5.2
  • PHPPHP
  • typo3/cms-core
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management