CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
AI Analysis
Technical Summary
CVE-2025-32432 is a critical remote code execution (RCE) vulnerability identified in Craft CMS, a widely used content management system designed for creating custom digital experiences. The vulnerability arises from improper control of code generation, classified under CWE-94, which allows an attacker to inject and execute arbitrary code on the server hosting the CMS. This flaw affects multiple major versions of Craft CMS: from 3.0.0-RC1 up to 3.9.15, 4.0.0-RC1 up to 4.14.15, and 5.0.0-RC1 up to 5.6.17. Exploitation requires no authentication or user interaction, and the attack vector is network-based, making it accessible remotely. The vulnerability is an extension or additional fix related to a prior issue (CVE-2023-41892), indicating ongoing security challenges in the code generation mechanisms of Craft CMS. The CVSS v3.1 base score is 10.0, reflecting critical impact on confidentiality, integrity, and availability, with an attacker able to fully compromise affected systems. Although no active exploits have been reported yet, the ease of exploitation and severity necessitate immediate remediation. The vendor has released patches in versions 3.9.15, 4.14.15, and 5.6.17 to remediate this vulnerability.
Potential Impact
The impact of CVE-2025-32432 is severe for organizations worldwide using vulnerable versions of Craft CMS. Successful exploitation allows attackers to execute arbitrary code remotely without any authentication or user interaction, leading to full system compromise. This can result in data breaches, unauthorized data manipulation, defacement of websites, deployment of malware or ransomware, and disruption of services. The confidentiality of sensitive data stored or processed by the CMS is at high risk, as is the integrity of website content and backend systems. Availability may also be affected if attackers disrupt or disable the CMS or underlying infrastructure. Given Craft CMS's use in diverse industries including media, e-commerce, and enterprise web applications, the potential for widespread damage is significant. Organizations failing to patch promptly may face regulatory penalties, reputational damage, and financial losses stemming from exploitation of this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-32432, organizations should immediately upgrade Craft CMS to the patched versions 3.9.15, 4.14.15, or 5.6.17 depending on their current version. If immediate upgrade is not feasible, implement network-level protections such as restricting access to the CMS administration interfaces and web application firewalls (WAFs) with rules designed to detect and block code injection attempts. Conduct thorough code audits and review any custom plugins or modules for unsafe code generation practices. Employ runtime application self-protection (RASP) solutions to detect anomalous execution patterns. Regularly monitor logs for suspicious activity indicative of exploitation attempts. Additionally, maintain robust backup and incident response plans to quickly recover from potential compromises. Finally, subscribe to vendor security advisories and threat intelligence feeds to stay informed about emerging exploits or related vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Brazil, India
CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-32432 is a critical remote code execution (RCE) vulnerability identified in Craft CMS, a widely used content management system designed for creating custom digital experiences. The vulnerability arises from improper control of code generation, classified under CWE-94, which allows an attacker to inject and execute arbitrary code on the server hosting the CMS. This flaw affects multiple major versions of Craft CMS: from 3.0.0-RC1 up to 3.9.15, 4.0.0-RC1 up to 4.14.15, and 5.0.0-RC1 up to 5.6.17. Exploitation requires no authentication or user interaction, and the attack vector is network-based, making it accessible remotely. The vulnerability is an extension or additional fix related to a prior issue (CVE-2023-41892), indicating ongoing security challenges in the code generation mechanisms of Craft CMS. The CVSS v3.1 base score is 10.0, reflecting critical impact on confidentiality, integrity, and availability, with an attacker able to fully compromise affected systems. Although no active exploits have been reported yet, the ease of exploitation and severity necessitate immediate remediation. The vendor has released patches in versions 3.9.15, 4.14.15, and 5.6.17 to remediate this vulnerability.
Potential Impact
The impact of CVE-2025-32432 is severe for organizations worldwide using vulnerable versions of Craft CMS. Successful exploitation allows attackers to execute arbitrary code remotely without any authentication or user interaction, leading to full system compromise. This can result in data breaches, unauthorized data manipulation, defacement of websites, deployment of malware or ransomware, and disruption of services. The confidentiality of sensitive data stored or processed by the CMS is at high risk, as is the integrity of website content and backend systems. Availability may also be affected if attackers disrupt or disable the CMS or underlying infrastructure. Given Craft CMS's use in diverse industries including media, e-commerce, and enterprise web applications, the potential for widespread damage is significant. Organizations failing to patch promptly may face regulatory penalties, reputational damage, and financial losses stemming from exploitation of this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-32432, organizations should immediately upgrade Craft CMS to the patched versions 3.9.15, 4.14.15, or 5.6.17 depending on their current version. If immediate upgrade is not feasible, implement network-level protections such as restricting access to the CMS administration interfaces and web application firewalls (WAFs) with rules designed to detect and block code injection attempts. Conduct thorough code audits and review any custom plugins or modules for unsafe code generation practices. Employ runtime application self-protection (RASP) solutions to detect anomalous execution patterns. Regularly monitor logs for suspicious activity indicative of exploitation attempts. Additionally, maintain robust backup and incident response plans to quickly recover from potential compromises. Finally, subscribe to vendor security advisories and threat intelligence feeds to stay informed about emerging exploits or related vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-08T10:54:58.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef27c
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 3/20/2026, 9:49:17 PM
Last updated: 3/24/2026, 8:22:02 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.