CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
AI Analysis
Technical Summary
CVE-2025-32432 is a critical remote code execution (RCE) vulnerability affecting multiple versions of the Craft CMS, a widely used content management system designed for creating custom digital experiences. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, this flaw allows an unauthenticated attacker to execute arbitrary code on the server running the vulnerable Craft CMS versions. The affected versions include all releases from 3.0.0-RC1 up to but not including 3.9.15, from 4.0.0-RC1 up to but not including 4.14.15, and from 5.0.0-RC1 up to but not including 5.6.17. The vulnerability is of high impact and low complexity, meaning it can be exploited remotely without any authentication or user interaction, and it can lead to full compromise of the affected system. The CVSS v3.1 base score is 10.0, indicating a critical severity with network attack vector, no privileges required, no user interaction, and a scope change that affects confidentiality and integrity at a high level, with some impact on availability. This vulnerability is an additional fix related to a previous issue tracked as CVE-2023-41892. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. The vulnerability allows attackers to inject and execute arbitrary code, potentially leading to data theft, system manipulation, deployment of malware, or use of the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations using Craft CMS within the affected versions, the impact can be severe. Successful exploitation can lead to complete system compromise, allowing attackers to access sensitive data, modify website content, deface sites, or disrupt services. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as e-commerce, government, media, and education that rely on Craft CMS for their digital presence are particularly at risk. The vulnerability’s ability to execute code remotely without authentication means that attackers can rapidly compromise multiple systems, potentially leading to widespread disruption. Additionally, compromised CMS instances can be used to distribute malware or launch attacks against other internal or external targets, amplifying the threat. The critical nature of this vulnerability necessitates immediate attention to prevent exploitation, especially given the potential for data confidentiality and integrity loss, as well as partial availability impact.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Craft CMS to the patched versions 3.9.15, 4.14.15, or 5.6.17 depending on their installed version series. 2. Implement Web Application Firewalls (WAFs): Deploy and configure WAFs with rules specifically targeting known Craft CMS attack patterns to provide an additional layer of defense against exploitation attempts. 3. Restrict access: Limit administrative and CMS backend access by IP whitelisting or VPN to reduce exposure to the internet. 4. Monitor logs: Enable detailed logging and monitor for unusual activity such as unexpected code execution attempts or anomalous requests targeting CMS endpoints. 5. Conduct code audits: Review custom plugins or modules for unsafe code generation or injection points that could exacerbate the vulnerability. 6. Backup and recovery: Maintain regular, tested backups of CMS data and configurations to enable rapid restoration in case of compromise. 7. Network segmentation: Isolate CMS servers from critical internal networks to limit lateral movement if compromised. 8. Incident response readiness: Prepare and rehearse incident response plans specific to CMS compromise scenarios to minimize damage and recovery time.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms
Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
AI-Powered Analysis
Technical Analysis
CVE-2025-32432 is a critical remote code execution (RCE) vulnerability affecting multiple versions of the Craft CMS, a widely used content management system designed for creating custom digital experiences. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, this flaw allows an unauthenticated attacker to execute arbitrary code on the server running the vulnerable Craft CMS versions. The affected versions include all releases from 3.0.0-RC1 up to but not including 3.9.15, from 4.0.0-RC1 up to but not including 4.14.15, and from 5.0.0-RC1 up to but not including 5.6.17. The vulnerability is of high impact and low complexity, meaning it can be exploited remotely without any authentication or user interaction, and it can lead to full compromise of the affected system. The CVSS v3.1 base score is 10.0, indicating a critical severity with network attack vector, no privileges required, no user interaction, and a scope change that affects confidentiality and integrity at a high level, with some impact on availability. This vulnerability is an additional fix related to a previous issue tracked as CVE-2023-41892. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. The vulnerability allows attackers to inject and execute arbitrary code, potentially leading to data theft, system manipulation, deployment of malware, or use of the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations using Craft CMS within the affected versions, the impact can be severe. Successful exploitation can lead to complete system compromise, allowing attackers to access sensitive data, modify website content, deface sites, or disrupt services. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as e-commerce, government, media, and education that rely on Craft CMS for their digital presence are particularly at risk. The vulnerability’s ability to execute code remotely without authentication means that attackers can rapidly compromise multiple systems, potentially leading to widespread disruption. Additionally, compromised CMS instances can be used to distribute malware or launch attacks against other internal or external targets, amplifying the threat. The critical nature of this vulnerability necessitates immediate attention to prevent exploitation, especially given the potential for data confidentiality and integrity loss, as well as partial availability impact.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Craft CMS to the patched versions 3.9.15, 4.14.15, or 5.6.17 depending on their installed version series. 2. Implement Web Application Firewalls (WAFs): Deploy and configure WAFs with rules specifically targeting known Craft CMS attack patterns to provide an additional layer of defense against exploitation attempts. 3. Restrict access: Limit administrative and CMS backend access by IP whitelisting or VPN to reduce exposure to the internet. 4. Monitor logs: Enable detailed logging and monitor for unusual activity such as unexpected code execution attempts or anomalous requests targeting CMS endpoints. 5. Conduct code audits: Review custom plugins or modules for unsafe code generation or injection points that could exacerbate the vulnerability. 6. Backup and recovery: Maintain regular, tested backups of CMS data and configurations to enable rapid restoration in case of compromise. 7. Network segmentation: Isolate CMS servers from critical internal networks to limit lateral movement if compromised. 8. Incident response readiness: Prepare and rehearse incident response plans specific to CMS compromise scenarios to minimize damage and recovery time.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-08T10:54:58.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef27c
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 10:35:21 PM
Last updated: 8/18/2025, 1:58:30 AM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.