CVE-2025-34074: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lucee Association Switzerland Lucee
CVE-2025-34074 is a critical authenticated remote code execution vulnerability in the Lucee web application server's administrative interface. It arises from insecure handling of scheduled tasks, allowing an administrator to configure a job that fetches and executes a remote . cfm file without integrity or path validation. Exploitation results in arbitrary code execution with the privileges of the Lucee service account. The vulnerability affects all Lucee versions with scheduled task functionality, notably versions 5. 0 and 6. 0. No user interaction or additional authentication beyond admin access is required. The CVSS 4. 0 score is 9.
AI Analysis
Technical Summary
CVE-2025-34074 is a critical vulnerability in the Lucee web application server, specifically within its administrative interface's scheduled task functionality. Lucee allows administrators to schedule tasks that can fetch remote .cfm files and execute them. Due to a design flaw, Lucee does not enforce integrity checks, path restrictions, or execution controls on these scheduled task fetches. An attacker with administrative access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a malicious .cfm file hosted on an attacker-controlled server. This file is then written to the Lucee webroot and executed with the privileges of the Lucee service account, enabling arbitrary code execution on the server. The vulnerability leverages improper control over code generation (CWE-94) and inclusion of functionality from an untrusted control sphere (CWE-829). The flaw affects all versions of Lucee with scheduled task functionality, including versions 5.0 and 6.0. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high privileges required, with high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability's critical severity and ease of exploitation by an authenticated admin make it a significant risk. This issue is separate from CVE-2024-55354, indicating a distinct attack surface. The lack of patch links suggests a fix may be pending or not yet publicly available.
Potential Impact
The vulnerability enables an attacker with administrative access to execute arbitrary code on the Lucee server with the privileges of the Lucee service account. This can lead to full system compromise, including data theft, service disruption, and lateral movement within the network. Because the malicious code executes with service-level privileges, attackers can manipulate application data, deploy backdoors, or pivot to other systems. The absence of integrity checks and path restrictions increases the risk of persistent compromise. Organizations relying on Lucee for web applications, especially those exposing administrative interfaces, face risks of data breaches, service outages, and reputational damage. The critical CVSS score reflects the potential for widespread impact if exploited in production environments. The requirement for administrative access limits exploitation to insiders or attackers who have already compromised admin credentials, but once accessed, the attack surface is severe. The vulnerability could be leveraged in targeted attacks against organizations using Lucee in sectors such as finance, government, healthcare, and e-commerce.
Mitigation Recommendations
To mitigate CVE-2025-34074, organizations should immediately restrict access to the Lucee administrative interface (/lucee/admin/web.cfm) using network-level controls such as VPNs, IP whitelisting, or firewalls to limit admin access to trusted personnel only. Enforce strong multi-factor authentication for all administrative accounts to reduce the risk of credential compromise. Disable or restrict scheduled task functionality if not required, or audit all scheduled tasks for suspicious remote fetch configurations. Monitor logs for unusual scheduled task creations or executions that fetch remote .cfm files. Implement application-layer controls to validate and restrict the sources of scheduled task fetches, if possible. Apply the official security patches from Lucee Association Switzerland as soon as they become available. In the interim, consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to create or execute malicious scheduled tasks. Conduct regular security audits and penetration tests focusing on administrative interfaces and scheduled task configurations. Educate administrators on the risks of scheduling tasks that fetch remote code and enforce policies to prevent unsafe configurations.
Affected Countries
United States, Germany, United Kingdom, France, Australia, Canada, Netherlands, Switzerland, India, Japan, South Korea
CVE-2025-34074: CWE-94 Improper Control of Generation of Code ('Code Injection') in Lucee Association Switzerland Lucee
Description
CVE-2025-34074 is a critical authenticated remote code execution vulnerability in the Lucee web application server's administrative interface. It arises from insecure handling of scheduled tasks, allowing an administrator to configure a job that fetches and executes a remote . cfm file without integrity or path validation. Exploitation results in arbitrary code execution with the privileges of the Lucee service account. The vulnerability affects all Lucee versions with scheduled task functionality, notably versions 5. 0 and 6. 0. No user interaction or additional authentication beyond admin access is required. The CVSS 4. 0 score is 9.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-34074 is a critical vulnerability in the Lucee web application server, specifically within its administrative interface's scheduled task functionality. Lucee allows administrators to schedule tasks that can fetch remote .cfm files and execute them. Due to a design flaw, Lucee does not enforce integrity checks, path restrictions, or execution controls on these scheduled task fetches. An attacker with administrative access to /lucee/admin/web.cfm can configure a scheduled job to retrieve a malicious .cfm file hosted on an attacker-controlled server. This file is then written to the Lucee webroot and executed with the privileges of the Lucee service account, enabling arbitrary code execution on the server. The vulnerability leverages improper control over code generation (CWE-94) and inclusion of functionality from an untrusted control sphere (CWE-829). The flaw affects all versions of Lucee with scheduled task functionality, including versions 5.0 and 6.0. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high privileges required, with high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability's critical severity and ease of exploitation by an authenticated admin make it a significant risk. This issue is separate from CVE-2024-55354, indicating a distinct attack surface. The lack of patch links suggests a fix may be pending or not yet publicly available.
Potential Impact
The vulnerability enables an attacker with administrative access to execute arbitrary code on the Lucee server with the privileges of the Lucee service account. This can lead to full system compromise, including data theft, service disruption, and lateral movement within the network. Because the malicious code executes with service-level privileges, attackers can manipulate application data, deploy backdoors, or pivot to other systems. The absence of integrity checks and path restrictions increases the risk of persistent compromise. Organizations relying on Lucee for web applications, especially those exposing administrative interfaces, face risks of data breaches, service outages, and reputational damage. The critical CVSS score reflects the potential for widespread impact if exploited in production environments. The requirement for administrative access limits exploitation to insiders or attackers who have already compromised admin credentials, but once accessed, the attack surface is severe. The vulnerability could be leveraged in targeted attacks against organizations using Lucee in sectors such as finance, government, healthcare, and e-commerce.
Mitigation Recommendations
To mitigate CVE-2025-34074, organizations should immediately restrict access to the Lucee administrative interface (/lucee/admin/web.cfm) using network-level controls such as VPNs, IP whitelisting, or firewalls to limit admin access to trusted personnel only. Enforce strong multi-factor authentication for all administrative accounts to reduce the risk of credential compromise. Disable or restrict scheduled task functionality if not required, or audit all scheduled tasks for suspicious remote fetch configurations. Monitor logs for unusual scheduled task creations or executions that fetch remote .cfm files. Implement application-layer controls to validate and restrict the sources of scheduled task fetches, if possible. Apply the official security patches from Lucee Association Switzerland as soon as they become available. In the interim, consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to create or execute malicious scheduled tasks. Conduct regular security audits and penetration tests focusing on administrative interfaces and scheduled task configurations. Educate administrators on the risks of scheduling tasks that fetch remote code and enforce policies to prevent unsafe configurations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.550Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68658af26f40f0eb7293bb13
Added to database: 7/2/2025, 7:39:30 PM
Last enriched: 3/24/2026, 12:25:15 AM
Last updated: 3/24/2026, 6:51:11 AM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.