Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32432: CWE-94: Improper Control of Generation of Code ('Code Injection') in craftcms cms

0
Critical
VulnerabilityCVE-2025-32432cvecve-2025-32432cwe-94
Published: Fri Apr 25 2025 (04/25/2025, 15:04:06 UTC)
Source: CVE
Vendor/Project: craftcms
Product: cms

Description

CVE-2025-32432 is a critical remote code execution vulnerability in Craft CMS versions from 3. 0. 0-RC1 up to but not including 3. 9. 15, 4. 0. 0-RC1 up to 4. 14. 15, and 5. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 23:04:46 UTC

Technical Analysis

CVE-2025-32432 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the Craft CMS platform. The flaw exists in multiple major version branches of Craft CMS, specifically from 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17. This vulnerability allows remote attackers to execute arbitrary code on the server without any authentication or user interaction, exploiting improper sanitization or validation in the code generation process. The vulnerability enables attackers to inject malicious code that the CMS executes, potentially leading to full system compromise. The CVSS v3.1 base score of 10.0 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, as attackers can fully control the affected system. This vulnerability is an additional fix related to CVE-2023-41892, indicating ongoing security challenges in this CMS. Although no active exploits have been reported, the ease of exploitation and critical impact necessitate urgent patching. The vendor has released fixed versions 3.9.15, 4.14.15, and 5.6.17 to remediate the issue.

Potential Impact

The impact of CVE-2025-32432 on organizations worldwide is severe. Exploitation allows unauthenticated remote attackers to execute arbitrary code on servers running vulnerable Craft CMS versions, potentially leading to full system compromise. This can result in data breaches exposing sensitive customer and business information, defacement or destruction of websites, disruption of business operations, and use of compromised servers as pivot points for further attacks within corporate networks. The vulnerability affects confidentiality, integrity, and availability, threatening the trustworthiness and availability of digital services built on Craft CMS. Organizations relying on Craft CMS for their web presence or digital experience platforms face significant operational and reputational risks. Given the low complexity and no authentication requirements, automated exploitation tools could emerge rapidly, increasing the threat landscape. The lack of known exploits currently provides a narrow window for remediation before active attacks potentially appear.

Mitigation Recommendations

To mitigate CVE-2025-32432, organizations should immediately upgrade Craft CMS installations to the patched versions: 3.9.15, 4.14.15, or 5.6.17, depending on their current version branch. Prioritize patching in production environments to eliminate the vulnerability. Additionally, implement strict network segmentation and firewall rules to limit external access to CMS management interfaces. Employ Web Application Firewalls (WAFs) with updated signatures to detect and block suspicious code injection attempts targeting Craft CMS. Conduct thorough audits of CMS plugins and third-party integrations to ensure they do not introduce similar vulnerabilities. Monitor logs for unusual activity indicative of exploitation attempts, such as unexpected code execution or unauthorized access patterns. Develop and test incident response plans specific to CMS compromises. Finally, maintain regular backups of CMS data and configurations to enable rapid recovery in case of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-08T10:54:58.368Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef27c

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 3/27/2026, 11:04:46 PM

Last updated: 5/9/2026, 1:47:51 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses