CVE-2025-23209: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
AI Analysis
Technical Summary
CVE-2025-23209 is a remote code execution (RCE) vulnerability classified under CWE-94, indicating improper control over code generation in Craft CMS, a widely used content management system for building custom digital experiences. This vulnerability affects Craft CMS versions 4.0.0-RC1 up to but not including 4.13.8, and 5.0.0-RC1 up to but not including 5.5.8. The root cause lies in insufficient validation or sanitization of dynamically generated code, which can be exploited if an attacker has already obtained the system's security key. The security key is a critical secret used by Craft CMS to secure various operations, and its compromise significantly lowers the barrier for exploitation. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), and user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system, allowing attackers to execute arbitrary code remotely. Although no known exploits are currently reported in the wild, the vulnerability poses a serious threat to unpatched Craft CMS installations with compromised keys. The vendor has released patches in versions 4.13.8 and 5.5.8 to remediate the issue. For users unable to upgrade immediately, rotating the security keys and enhancing privacy protections are recommended interim measures.
Potential Impact
For European organizations, this vulnerability presents a significant risk, especially for those relying on Craft CMS for their web presence or digital services. Exploitation could lead to unauthorized remote code execution, resulting in data breaches, defacement, service disruption, or use of compromised servers as pivot points for further attacks. The impact on confidentiality could expose sensitive customer or business data, while integrity violations could alter website content or backend data. Availability could be affected through denial-of-service conditions or ransomware deployment. Given the high CVSS score and the critical role of CMS platforms in digital operations, organizations in sectors such as finance, government, healthcare, and e-commerce are particularly vulnerable. The requirement for a compromised security key means that organizations with weak key management or prior breaches are at elevated risk. The lack of known exploits in the wild suggests a window for proactive defense, but also the potential for future exploitation once public details are widely known.
Mitigation Recommendations
The primary mitigation is to upgrade Craft CMS installations to versions 4.13.8 or 5.5.8 or later, where the vulnerability is patched. Organizations unable to immediately patch should rotate their security keys to invalidate any compromised keys, thereby preventing exploitation. It is critical to audit and strengthen key management practices to prevent future compromises. Additionally, implement strict access controls and monitoring around CMS administrative interfaces to detect and block unauthorized access attempts. Employ web application firewalls (WAFs) with rules tailored to detect suspicious code injection patterns related to this vulnerability. Regularly review logs for unusual activity indicative of exploitation attempts. Conduct security awareness training to reduce the risk of social engineering that could lead to key compromise. Finally, maintain an incident response plan that includes steps for containment and recovery in case of a successful attack exploiting this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-23209: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-23209 is a remote code execution (RCE) vulnerability classified under CWE-94, indicating improper control over code generation in Craft CMS, a widely used content management system for building custom digital experiences. This vulnerability affects Craft CMS versions 4.0.0-RC1 up to but not including 4.13.8, and 5.0.0-RC1 up to but not including 5.5.8. The root cause lies in insufficient validation or sanitization of dynamically generated code, which can be exploited if an attacker has already obtained the system's security key. The security key is a critical secret used by Craft CMS to secure various operations, and its compromise significantly lowers the barrier for exploitation. The CVSS v3.1 score is 8.1, indicating a high severity with network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), and user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system, allowing attackers to execute arbitrary code remotely. Although no known exploits are currently reported in the wild, the vulnerability poses a serious threat to unpatched Craft CMS installations with compromised keys. The vendor has released patches in versions 4.13.8 and 5.5.8 to remediate the issue. For users unable to upgrade immediately, rotating the security keys and enhancing privacy protections are recommended interim measures.
Potential Impact
For European organizations, this vulnerability presents a significant risk, especially for those relying on Craft CMS for their web presence or digital services. Exploitation could lead to unauthorized remote code execution, resulting in data breaches, defacement, service disruption, or use of compromised servers as pivot points for further attacks. The impact on confidentiality could expose sensitive customer or business data, while integrity violations could alter website content or backend data. Availability could be affected through denial-of-service conditions or ransomware deployment. Given the high CVSS score and the critical role of CMS platforms in digital operations, organizations in sectors such as finance, government, healthcare, and e-commerce are particularly vulnerable. The requirement for a compromised security key means that organizations with weak key management or prior breaches are at elevated risk. The lack of known exploits in the wild suggests a window for proactive defense, but also the potential for future exploitation once public details are widely known.
Mitigation Recommendations
The primary mitigation is to upgrade Craft CMS installations to versions 4.13.8 or 5.5.8 or later, where the vulnerability is patched. Organizations unable to immediately patch should rotate their security keys to invalidate any compromised keys, thereby preventing exploitation. It is critical to audit and strengthen key management practices to prevent future compromises. Additionally, implement strict access controls and monitoring around CMS administrative interfaces to detect and block unauthorized access attempts. Employ web application firewalls (WAFs) with rules tailored to detect suspicious code injection patterns related to this vulnerability. Regularly review logs for unusual activity indicative of exploitation attempts. Conduct security awareness training to reduce the risk of social engineering that could lead to key compromise. Finally, maintain an incident response plan that includes steps for containment and recovery in case of a successful attack exploiting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-01-13T17:15:41.051Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68881727ad5a09ad0088bc50
Added to database: 7/29/2025, 12:34:47 AM
Last enriched: 10/21/2025, 8:03:41 PM
Last updated: 11/30/2025, 2:56:24 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66424: CWE-863 Incorrect Authorization in Tryton trytond
MediumCVE-2025-66423: CWE-863 Incorrect Authorization in Tryton trytond
HighCVE-2025-66422: CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak') in Tryton trytond
MediumCVE-2025-66421: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Tryton sao
MediumCVE-2025-66420: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Tryton sao
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.