CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
CVE-2025-32432 is a critical remote code execution vulnerability in Craft CMS versions from 3. 0. 0-RC1 up to but not including 3. 9. 15, 4. 0. 0-RC1 up to 4. 14. 15, and 5. 0.
AI Analysis
Technical Summary
CVE-2025-32432 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the Craft CMS platform. The flaw exists in multiple major version branches of Craft CMS, specifically from 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17. This vulnerability allows remote attackers to execute arbitrary code on the server without any authentication or user interaction, exploiting improper sanitization or validation in the code generation process. The vulnerability enables attackers to inject malicious code that the CMS executes, potentially leading to full system compromise. The CVSS v3.1 base score of 10.0 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, as attackers can fully control the affected system. This vulnerability is an additional fix related to CVE-2023-41892, indicating ongoing security challenges in this CMS. Although no active exploits have been reported, the ease of exploitation and critical impact necessitate urgent patching. The vendor has released fixed versions 3.9.15, 4.14.15, and 5.6.17 to remediate the issue.
Potential Impact
The impact of CVE-2025-32432 on organizations worldwide is severe. Exploitation allows unauthenticated remote attackers to execute arbitrary code on servers running vulnerable Craft CMS versions, potentially leading to full system compromise. This can result in data breaches exposing sensitive customer and business information, defacement or destruction of websites, disruption of business operations, and use of compromised servers as pivot points for further attacks within corporate networks. The vulnerability affects confidentiality, integrity, and availability, threatening the trustworthiness and availability of digital services built on Craft CMS. Organizations relying on Craft CMS for their web presence or digital experience platforms face significant operational and reputational risks. Given the low complexity and no authentication requirements, automated exploitation tools could emerge rapidly, increasing the threat landscape. The lack of known exploits currently provides a narrow window for remediation before active attacks potentially appear.
Mitigation Recommendations
To mitigate CVE-2025-32432, organizations should immediately upgrade Craft CMS installations to the patched versions: 3.9.15, 4.14.15, or 5.6.17, depending on their current version branch. Prioritize patching in production environments to eliminate the vulnerability. Additionally, implement strict network segmentation and firewall rules to limit external access to CMS management interfaces. Employ Web Application Firewalls (WAFs) with updated signatures to detect and block suspicious code injection attempts targeting Craft CMS. Conduct thorough audits of CMS plugins and third-party integrations to ensure they do not introduce similar vulnerabilities. Monitor logs for unusual activity indicative of exploitation attempts, such as unexpected code execution or unauthorized access patterns. Develop and test incident response plans specific to CMS compromises. Finally, maintain regular backups of CMS data and configurations to enable rapid recovery in case of successful exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Brazil, India
CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Description
CVE-2025-32432 is a critical remote code execution vulnerability in Craft CMS versions from 3. 0. 0-RC1 up to but not including 3. 9. 15, 4. 0. 0-RC1 up to 4. 14. 15, and 5. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-32432 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the Craft CMS platform. The flaw exists in multiple major version branches of Craft CMS, specifically from 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17. This vulnerability allows remote attackers to execute arbitrary code on the server without any authentication or user interaction, exploiting improper sanitization or validation in the code generation process. The vulnerability enables attackers to inject malicious code that the CMS executes, potentially leading to full system compromise. The CVSS v3.1 base score of 10.0 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, as attackers can fully control the affected system. This vulnerability is an additional fix related to CVE-2023-41892, indicating ongoing security challenges in this CMS. Although no active exploits have been reported, the ease of exploitation and critical impact necessitate urgent patching. The vendor has released fixed versions 3.9.15, 4.14.15, and 5.6.17 to remediate the issue.
Potential Impact
The impact of CVE-2025-32432 on organizations worldwide is severe. Exploitation allows unauthenticated remote attackers to execute arbitrary code on servers running vulnerable Craft CMS versions, potentially leading to full system compromise. This can result in data breaches exposing sensitive customer and business information, defacement or destruction of websites, disruption of business operations, and use of compromised servers as pivot points for further attacks within corporate networks. The vulnerability affects confidentiality, integrity, and availability, threatening the trustworthiness and availability of digital services built on Craft CMS. Organizations relying on Craft CMS for their web presence or digital experience platforms face significant operational and reputational risks. Given the low complexity and no authentication requirements, automated exploitation tools could emerge rapidly, increasing the threat landscape. The lack of known exploits currently provides a narrow window for remediation before active attacks potentially appear.
Mitigation Recommendations
To mitigate CVE-2025-32432, organizations should immediately upgrade Craft CMS installations to the patched versions: 3.9.15, 4.14.15, or 5.6.17, depending on their current version branch. Prioritize patching in production environments to eliminate the vulnerability. Additionally, implement strict network segmentation and firewall rules to limit external access to CMS management interfaces. Employ Web Application Firewalls (WAFs) with updated signatures to detect and block suspicious code injection attempts targeting Craft CMS. Conduct thorough audits of CMS plugins and third-party integrations to ensure they do not introduce similar vulnerabilities. Monitor logs for unusual activity indicative of exploitation attempts, such as unexpected code execution or unauthorized access patterns. Develop and test incident response plans specific to CMS compromises. Finally, maintain regular backups of CMS data and configurations to enable rapid recovery in case of successful exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-08T10:54:58.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef27c
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 3/27/2026, 11:04:46 PM
Last updated: 5/9/2026, 1:47:51 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.