Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34074: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lucee Association Switzerland Lucee

0
Critical
VulnerabilityCVE-2025-34074cvecve-2025-34074cwe-94cwe-829
Published: Wed Jul 02 2025 (07/02/2025, 19:26:31 UTC)
Source: CVE Database V5
Vendor/Project: Lucee Association Switzerland
Product: Lucee

Description

CVE-2025-34074 is a critical authenticated remote code execution vulnerability in the Lucee web application server's administrative interface. It arises from insecure handling of scheduled tasks, allowing an administrator to configure a job that fetches and executes a remote . cfm file without integrity or path validation. Exploitation results in arbitrary code execution with the privileges of the Lucee service account. The vulnerability affects all Lucee versions with scheduled task functionality, notably versions 5. 0 and 6. 0. No user interaction or additional authentication beyond admin access is required. The CVSS 4. 0 score is 9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:25:15 UTC

Technical Analysis

CVE-2025-34074 is a critical vulnerability in the Lucee web application server, specifically within its administrative interface's scheduled task functionality. Lucee allows administrators to schedule tasks that can fetch remote .cfm files and execute them. Due to a design flaw, Lucee does not enforce integrity checks, path restrictions, or execution controls on these scheduled task fetches. An attacker with administrative access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a malicious .cfm file hosted on an attacker-controlled server. This file is then written to the Lucee webroot and executed with the privileges of the Lucee service account, enabling arbitrary code execution on the server. The vulnerability leverages improper control over code generation (CWE-94) and inclusion of functionality from an untrusted control sphere (CWE-829). The flaw affects all versions of Lucee with scheduled task functionality, including versions 5.0 and 6.0. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high privileges required, with high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability's critical severity and ease of exploitation by an authenticated admin make it a significant risk. This issue is separate from CVE-2024-55354, indicating a distinct attack surface. The lack of patch links suggests a fix may be pending or not yet publicly available.

Potential Impact

The vulnerability enables an attacker with administrative access to execute arbitrary code on the Lucee server with the privileges of the Lucee service account. This can lead to full system compromise, including data theft, service disruption, and lateral movement within the network. Because the malicious code executes with service-level privileges, attackers can manipulate application data, deploy backdoors, or pivot to other systems. The absence of integrity checks and path restrictions increases the risk of persistent compromise. Organizations relying on Lucee for web applications, especially those exposing administrative interfaces, face risks of data breaches, service outages, and reputational damage. The critical CVSS score reflects the potential for widespread impact if exploited in production environments. The requirement for administrative access limits exploitation to insiders or attackers who have already compromised admin credentials, but once accessed, the attack surface is severe. The vulnerability could be leveraged in targeted attacks against organizations using Lucee in sectors such as finance, government, healthcare, and e-commerce.

Mitigation Recommendations

To mitigate CVE-2025-34074, organizations should immediately restrict access to the Lucee administrative interface (/lucee/admin/web.cfm) using network-level controls such as VPNs, IP whitelisting, or firewalls to limit admin access to trusted personnel only. Enforce strong multi-factor authentication for all administrative accounts to reduce the risk of credential compromise. Disable or restrict scheduled task functionality if not required, or audit all scheduled tasks for suspicious remote fetch configurations. Monitor logs for unusual scheduled task creations or executions that fetch remote .cfm files. Implement application-layer controls to validate and restrict the sources of scheduled task fetches, if possible. Apply the official security patches from Lucee Association Switzerland as soon as they become available. In the interim, consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to create or execute malicious scheduled tasks. Conduct regular security audits and penetration tests focusing on administrative interfaces and scheduled task configurations. Educate administrators on the risks of scheduling tasks that fetch remote code and enforce policies to prevent unsafe configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.550Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68658af26f40f0eb7293bb13

Added to database: 7/2/2025, 7:39:30 PM

Last enriched: 3/24/2026, 12:25:15 AM

Last updated: 3/24/2026, 6:51:11 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses