Skip to main content

CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms

Critical
VulnerabilityCVE-2025-32432cvecve-2025-32432cwe-94
Published: Fri Apr 25 2025 (04/25/2025, 15:04:06 UTC)
Source: CVE
Vendor/Project: craftcms
Product: cms

Description

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.

AI-Powered Analysis

AILast updated: 06/24/2025, 22:35:21 UTC

Technical Analysis

CVE-2025-32432 is a critical remote code execution (RCE) vulnerability affecting multiple versions of the Craft CMS, a widely used content management system designed for creating custom digital experiences. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, this flaw allows an unauthenticated attacker to execute arbitrary code on the server running the vulnerable Craft CMS versions. The affected versions include all releases from 3.0.0-RC1 up to but not including 3.9.15, from 4.0.0-RC1 up to but not including 4.14.15, and from 5.0.0-RC1 up to but not including 5.6.17. The vulnerability is of high impact and low complexity, meaning it can be exploited remotely without any authentication or user interaction, and it can lead to full compromise of the affected system. The CVSS v3.1 base score is 10.0, indicating a critical severity with network attack vector, no privileges required, no user interaction, and a scope change that affects confidentiality and integrity at a high level, with some impact on availability. This vulnerability is an additional fix related to a previous issue tracked as CVE-2023-41892. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. The vulnerability allows attackers to inject and execute arbitrary code, potentially leading to data theft, system manipulation, deployment of malware, or use of the compromised server as a pivot point for further attacks.

Potential Impact

For European organizations using Craft CMS within the affected versions, the impact can be severe. Successful exploitation can lead to complete system compromise, allowing attackers to access sensitive data, modify website content, deface sites, or disrupt services. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as e-commerce, government, media, and education that rely on Craft CMS for their digital presence are particularly at risk. The vulnerability’s ability to execute code remotely without authentication means that attackers can rapidly compromise multiple systems, potentially leading to widespread disruption. Additionally, compromised CMS instances can be used to distribute malware or launch attacks against other internal or external targets, amplifying the threat. The critical nature of this vulnerability necessitates immediate attention to prevent exploitation, especially given the potential for data confidentiality and integrity loss, as well as partial availability impact.

Mitigation Recommendations

1. Immediate upgrade: Organizations should promptly update Craft CMS to the patched versions 3.9.15, 4.14.15, or 5.6.17 depending on their installed version series. 2. Implement Web Application Firewalls (WAFs): Deploy and configure WAFs with rules specifically targeting known Craft CMS attack patterns to provide an additional layer of defense against exploitation attempts. 3. Restrict access: Limit administrative and CMS backend access by IP whitelisting or VPN to reduce exposure to the internet. 4. Monitor logs: Enable detailed logging and monitor for unusual activity such as unexpected code execution attempts or anomalous requests targeting CMS endpoints. 5. Conduct code audits: Review custom plugins or modules for unsafe code generation or injection points that could exacerbate the vulnerability. 6. Backup and recovery: Maintain regular, tested backups of CMS data and configurations to enable rapid restoration in case of compromise. 7. Network segmentation: Isolate CMS servers from critical internal networks to limit lateral movement if compromised. 8. Incident response readiness: Prepare and rehearse incident response plans specific to CMS compromise scenarios to minimize damage and recovery time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-08T10:54:58.368Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef27c

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 10:35:21 PM

Last updated: 8/18/2025, 1:58:30 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats