CVE-2025-9573
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-02

Last updated on: 2025-09-02

Assigner: TYPO3

Description
The ns_backup extension through 13.0.2 for TYPO3 allows command injection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-02
Last Modified
2025-09-02
Generated
2026-05-07
AI Q&A
2025-09-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
typo3 ns_backup 13.0.2
typo3 ns_backup *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9573 is a Command Injection vulnerability in the TYPO3 extension 'ns_backup' (TYPO3 Backup Plus) versions 13.0.2 and below. It occurs because the extension does not properly sanitize user input during backup creation, allowing an attacker with a valid administrator account to execute arbitrary system commands. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with administrator privileges to execute arbitrary commands on the affected system, potentially leading to full system compromise, unauthorized data access, data loss, or disruption of services. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the TYPO3 installation is running the ns_backup extension version 13.0.2 or below. Since the vulnerability involves command injection via backup creation, monitoring logs for unusual command execution or unexpected system commands triggered by the TYPO3 backend may help detect exploitation attempts. Specific detection commands are not provided in the resources. It is recommended to verify the extension version via the TYPO3 extension manager or by inspecting the installed extensions list. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the ns_backup extension to version 13.0.3 or later, which contains the fix for this command injection vulnerability. This update is available via the TYPO3 extension manager, Packagist, and the TYPO3 extensions repository. Additionally, ensure that only trusted administrators have access to the TYPO3 backend, follow the TYPO3 Security Guide, and subscribe to the typo3-announce mailing list for further security updates. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart