- Release Date: July 22, 2025
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Component: "powermail" (powermail)
- Composer Package Name: in2code/powermail
- Vulnerability Type: Insecure Direct Object Reference
- Affected Versions: 12.0.0 - 12.5.2, 13.0.0
- Severity: Medium
- Suggested CVSS v4.0: AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
- References: CVE-2025-7899, CWE-639
Problem Description
The extension fails to validate the query parameter “file” of the “downloadFile” function in the backend module of the extension resulting in Insecure Direct Object Reference (IDOR). An authenticated attacker with access to the backend module can use this vulnerability to download arbitrary files the webserver has access to. In order to successfully exploit the vulnerability, it is required that at least one powermail email record containing an uploaded file is available in the backend module.
Solution
Updated versions 12.5.3 and 13.0.1 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/powermail/12.5.3/zip
https://extensions.typo3.org/extension/download/powermail/13.0.1/zip
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Riny van Tiggelen for reporting the vulnerability and to Marcus Schwemer for providing updated versions of the extension.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.