CVE-2025-9573
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-02
Assigner: TYPO3
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| typo3 | ns_backup | 13.0.2 |
| typo3 | ns_backup | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-9573 is a Command Injection vulnerability in the TYPO3 extension 'ns_backup' (TYPO3 Backup Plus) versions 13.0.2 and below. It occurs because the extension does not properly sanitize user input during backup creation, allowing an attacker with a valid administrator account to execute arbitrary system commands. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with administrator privileges to execute arbitrary commands on the affected system, potentially leading to full system compromise, unauthorized data access, data loss, or disruption of services. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the TYPO3 installation is running the ns_backup extension version 13.0.2 or below. Since the vulnerability involves command injection via backup creation, monitoring logs for unusual command execution or unexpected system commands triggered by the TYPO3 backend may help detect exploitation attempts. Specific detection commands are not provided in the resources. It is recommended to verify the extension version via the TYPO3 extension manager or by inspecting the installed extensions list. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the ns_backup extension to version 13.0.3 or later, which contains the fix for this command injection vulnerability. This update is available via the TYPO3 extension manager, Packagist, and the TYPO3 extensions repository. Additionally, ensure that only trusted administrators have access to the TYPO3 backend, follow the TYPO3 Security Guide, and subscribe to the typo3-announce mailing list for further security updates. [1]