TYPO3-EXT-SA-2025-009: Insecure Direct Object Reference in extension "powermail" (powermail)

Categories: Development Created by Torben Hansen
It has been discovered that the extension "powermail" (powermail) is susceptible to Insecure Direct Object Reference.

Problem Description

The extension fails to validate the query parameter “file” of the “downloadFile” function in the backend module of the extension resulting in Insecure Direct Object Reference (IDOR). An authenticated attacker with access to the backend module can use this vulnerability to download arbitrary files the webserver has access to. In order to successfully exploit the vulnerability, it is required that at least one powermail email record containing an uploaded file is available in the backend module.

Solution

Updated versions 12.5.3 and 13.0.1 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/powermail/12.5.3/zip
https://extensions.typo3.org/extension/download/powermail/13.0.1/zip

Users of the extension are advised to update the extension as soon as possible.

Credits

Thanks to Riny van Tiggelen for reporting the vulnerability and to Marcus Schwemer for providing updated versions of the extension.

General Advice

Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.