CVE-2025-23209: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
AI Analysis
Technical Summary
CVE-2025-23209 is a high-severity remote code execution (RCE) vulnerability affecting Craft CMS versions 4 and 5 prior to 4.13.8 and 5.5.8 respectively. The vulnerability is categorized under CWE-94, which involves improper control of code generation, commonly known as code injection. This flaw allows an attacker to execute arbitrary code on the affected system remotely, but only if the attacker already has access to a compromised security key. The security key in Craft CMS is a critical secret used for cryptographic operations and securing sessions. If this key is leaked or compromised, an attacker can leverage this vulnerability to inject and execute malicious code, potentially taking full control of the CMS environment. The vulnerability requires low privileges (PR:L) and user interaction (UI:R), with a high attack complexity (AC:H), meaning exploitation is not trivial but feasible under the right conditions. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with a scope change (S:C) indicating that the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, but the risk remains significant for unpatched systems with compromised keys. The vulnerability has been patched in Craft CMS versions 4.13.8 and 5.5.8. For users unable to upgrade immediately, rotating the security key and ensuring privacy controls are recommended as interim mitigations.
Potential Impact
For European organizations using Craft CMS, this vulnerability poses a serious risk. Successful exploitation can lead to full system compromise, including unauthorized data access, data modification, and service disruption. Given that Craft CMS is used for creating custom digital experiences, including websites and web applications, the breach could expose sensitive customer data, intellectual property, and internal business information. The requirement of a compromised security key means that organizations with weak key management or prior breaches are at elevated risk. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and potential financial losses. Additionally, attackers could use compromised CMS instances as pivot points for further attacks within the network. The high severity and scope change imply that the vulnerability could affect multiple components and services connected to the CMS, amplifying the potential damage.
Mitigation Recommendations
1. Immediate patching: Upgrade Craft CMS to versions 4.13.8 or 5.5.8 as soon as possible to eliminate the vulnerability. 2. Security key rotation: If patching is delayed, rotate the security key to invalidate any compromised keys. This should be done carefully to avoid service disruption. 3. Access controls: Restrict access to the CMS admin panel and configuration files to trusted personnel only, using network segmentation and IP whitelisting where feasible. 4. Monitor for key compromise: Implement monitoring and alerting for suspicious access patterns or unauthorized changes to security keys and configuration files. 5. Harden user authentication: Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of key compromise. 6. Regular backups: Maintain secure, offline backups of CMS data and configurations to enable recovery in case of compromise. 7. Incident response readiness: Prepare and test incident response plans specifically addressing CMS compromise scenarios. 8. Privacy controls: Limit exposure of sensitive data within the CMS and ensure compliance with data protection regulations to mitigate impact if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Italy
CVE-2025-23209: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-23209 is a high-severity remote code execution (RCE) vulnerability affecting Craft CMS versions 4 and 5 prior to 4.13.8 and 5.5.8 respectively. The vulnerability is categorized under CWE-94, which involves improper control of code generation, commonly known as code injection. This flaw allows an attacker to execute arbitrary code on the affected system remotely, but only if the attacker already has access to a compromised security key. The security key in Craft CMS is a critical secret used for cryptographic operations and securing sessions. If this key is leaked or compromised, an attacker can leverage this vulnerability to inject and execute malicious code, potentially taking full control of the CMS environment. The vulnerability requires low privileges (PR:L) and user interaction (UI:R), with a high attack complexity (AC:H), meaning exploitation is not trivial but feasible under the right conditions. The CVSS v3.1 score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with a scope change (S:C) indicating that the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, but the risk remains significant for unpatched systems with compromised keys. The vulnerability has been patched in Craft CMS versions 4.13.8 and 5.5.8. For users unable to upgrade immediately, rotating the security key and ensuring privacy controls are recommended as interim mitigations.
Potential Impact
For European organizations using Craft CMS, this vulnerability poses a serious risk. Successful exploitation can lead to full system compromise, including unauthorized data access, data modification, and service disruption. Given that Craft CMS is used for creating custom digital experiences, including websites and web applications, the breach could expose sensitive customer data, intellectual property, and internal business information. The requirement of a compromised security key means that organizations with weak key management or prior breaches are at elevated risk. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and potential financial losses. Additionally, attackers could use compromised CMS instances as pivot points for further attacks within the network. The high severity and scope change imply that the vulnerability could affect multiple components and services connected to the CMS, amplifying the potential damage.
Mitigation Recommendations
1. Immediate patching: Upgrade Craft CMS to versions 4.13.8 or 5.5.8 as soon as possible to eliminate the vulnerability. 2. Security key rotation: If patching is delayed, rotate the security key to invalidate any compromised keys. This should be done carefully to avoid service disruption. 3. Access controls: Restrict access to the CMS admin panel and configuration files to trusted personnel only, using network segmentation and IP whitelisting where feasible. 4. Monitor for key compromise: Implement monitoring and alerting for suspicious access patterns or unauthorized changes to security keys and configuration files. 5. Harden user authentication: Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of key compromise. 6. Regular backups: Maintain secure, offline backups of CMS data and configurations to enable recovery in case of compromise. 7. Incident response readiness: Prepare and test incident response plans specifically addressing CMS compromise scenarios. 8. Privacy controls: Limit exposure of sensitive data within the CMS and ensure compliance with data protection regulations to mitigate impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-01-13T17:15:41.051Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881727ad5a09ad0088bc50
Added to database: 7/29/2025, 12:34:47 AM
Last enriched: 8/5/2025, 1:01:40 AM
Last updated: 9/1/2025, 8:41:03 PM
Views: 10
Related Threats
CVE-2025-9834: Cross Site Scripting in PHPGurukul Small CRM
MediumCVE-2025-9833: SQL Injection in SourceCodester Online Farm Management System
MediumCVE-2025-9831: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9832: SQL Injection in SourceCodester Food Ordering Management System
MediumCVE-2025-9330: CWE-427: Uncontrolled Search Path Element in Foxit PDF Reader
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.