- Release Date: July 22, 2025
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Component: femanager (femanager)
- Composer Package Name: in2code/femanager
- Vulnerability Type: Insecure Direct Object Reference
- Affected Versions: 6.4.1 and below, 7.0.0 - 7.5.2, 8.0.0 - 8.3.0
- Severity: Medium
- Suggested CVSS v4.0: AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
- References: CVE-2025-7900, CWE-639
Problem Description
The affected TYPO3 extension attempts to validate the integrity of the __identity parameter when saving user-submitted data. If a modification of the __identity value is detected, the extension logs the incident using Extbase persistence mechanisms.
However, due to improper handling of the manipulated user object (mapped by Extbase based on the modified __identity parameter) the logging operation unintentionally persists changes to the user object. This allows authenticated frontend users with access to the "Edit" plugin to arbitrarily modify other frontend user records by submitting manipulated data.
Solution
Updated versions 6.4.2, 7.5.3 and 8.3.1 are available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/femanager/8.3.1/zip
https://extensions.typo3.org/extension/download/femanager/7.5.3/zip
https://extensions.typo3.org/extension/download/femanager/6.4.2/zip
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Alexander Freundlieb for reporting the vulnerability and to Stefan Busemann for providing updated versions of the extension.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.