Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34086: CWE-94 Improper Control of Generation of Code ('Code Injection') in Bolt CMS

0
High
VulnerabilityCVE-2025-34086cvecve-2025-34086cwe-94cwe-434
Published: Thu Jul 03 2025 (07/03/2025, 19:46:16 UTC)
Source: CVE Database V5
Vendor/Project: Bolt
Product: CMS

Description

Bolt CMS versions 3.7.0 and earlier contain a chain of vulnerabilities that together allow an authenticated user to achieve remote code execution. A user with valid credentials can inject arbitrary PHP code into the displayname field of the user profile, which is rendered unsanitized in backend templates. The attacker can then list and rename cached session files via the /async/browse/cache/.sessions and /async/folder/rename endpoints. By renaming a .session file to a path under the publicly accessible /files/ directory with a .php extension, the attacker can turn the injected code into an executable web shell. Finally, the attacker triggers the payload via a crafted HTTP GET request to the rogue file. NOTE: The vendor announced that Bolt 3 reached end-of-life after 31 December 2021.

AI-Powered Analysis

AILast updated: 11/26/2025, 14:08:58 UTC

Technical Analysis

CVE-2025-34086 is a chain of vulnerabilities in Bolt CMS version 3.7.0 and earlier that enables an authenticated user to perform remote code execution (RCE) through improper input sanitization and insecure file handling. The vulnerability stems from the displayname field in user profiles, which accepts arbitrary PHP code that is rendered unsanitized within backend templates, constituting a CWE-94 (Improper Control of Generation of Code) weakness. An attacker with valid credentials can inject malicious PHP code into this field. Subsequently, the attacker exploits endpoints /async/browse/cache/.sessions and /async/folder/rename to list and rename cached session files. By renaming a .session file to a .php file placed under the publicly accessible /files/ directory, the attacker effectively creates a web shell containing the injected PHP code. This web shell can then be triggered remotely via a crafted HTTP GET request, allowing execution of arbitrary commands on the server. The vulnerability requires authentication and some user interaction but does not require administrative privileges. The CVSS 4.0 score is 7.5 (high), reflecting the network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Notably, Bolt CMS 3 reached end-of-life on 31 December 2021, so no official patches exist, increasing the risk for organizations still running these versions. The vulnerability combines CWE-94 (code injection) and CWE-434 (unrestricted upload of file with dangerous type) characteristics due to the file renaming and execution mechanism. No known exploits are currently reported in the wild, but the exploitability is straightforward for authenticated users. This vulnerability highlights the risks of running unsupported CMS versions and the importance of input sanitization and secure file handling in web applications.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those using outdated Bolt CMS 3 installations for public-facing websites or intranet portals. Successful exploitation results in remote code execution, allowing attackers to execute arbitrary commands, potentially leading to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. The requirement for valid credentials limits exposure to insider threats or compromised user accounts but remains critical given the ease of injecting code and creating web shells. The ability to rename session files to executable PHP scripts in a public directory increases the attack surface and bypasses typical upload restrictions. Organizations in sectors with high web presence, such as media, education, and government, may face reputational damage and regulatory penalties under GDPR if personal data confidentiality and integrity are compromised. Additionally, the lack of vendor support for Bolt CMS 3 means no official patches are available, increasing the risk of prolonged exposure. Attackers could leverage this vulnerability to establish persistent access, disrupt services, or launch further attacks within European networks.

Mitigation Recommendations

Given that Bolt CMS 3 is end-of-life and no official patches exist, the primary mitigation is to upgrade to a supported version of Bolt CMS or migrate to a different, actively maintained CMS platform. If immediate upgrade is not feasible, organizations should restrict access to the vulnerable backend endpoints (/async/browse/cache/.sessions and /async/folder/rename) using network-level controls such as firewalls or web application firewalls (WAFs). Implement strict access controls and multi-factor authentication (MFA) to reduce the risk of credential compromise. Sanitize and validate all user inputs rigorously, especially fields rendered in backend templates, to prevent code injection. Monitor file system activity for suspicious renaming of session files or creation of PHP files in public directories. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of web shell activity. Regularly audit user accounts and permissions to limit authenticated users to the minimum necessary privileges. Finally, conduct security awareness training to reduce the risk of credential theft and insider threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.551Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6866dff66f40f0eb729b6244

Added to database: 7/3/2025, 7:54:30 PM

Last enriched: 11/26/2025, 2:08:58 PM

Last updated: 12/13/2025, 6:50:13 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats