Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35939: CWE-472 External Control of Assumed-Immutable Web Parameter in Craft CMS

0
Medium
VulnerabilityCVE-2025-35939cvecve-2025-35939cwe-472
Published: Wed May 07 2025 (05/07/2025, 22:41:29 UTC)
Source: CVE
Vendor/Project: Craft
Product: CMS

Description

Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.

AI-Powered Analysis

AILast updated: 10/21/2025, 21:16:38 UTC

Technical Analysis

CVE-2025-35939 is a vulnerability classified under CWE-472 (External Control of Assumed-Immutable Web Parameter) affecting Craft CMS. The core issue arises because Craft CMS stores arbitrary content provided by unauthenticated users in session files without proper sanitization. Specifically, when unauthenticated clients request pages requiring authentication, Craft CMS redirects them to a login page and creates a session file named 'sess_[session_value]' in the server's session directory ('/var/lib/php/sessions'). The session value is sent to the client via a 'Set-Cookie' header. The vulnerability stems from the fact that the return URL parameter, which is stored in the session file, is not sanitized. This allows an attacker to inject arbitrary data, including potentially malicious PHP code, into a known local file on the server. While the vulnerability itself does not directly enable code execution, it sets the stage for exploitation if combined with an independent vulnerability that allows execution of the injected code. The vulnerability affects Craft CMS versions before 5.7.5 and 4.15.3, which have addressed the issue by sanitizing inputs and securing session handling. The CVSS 3.1 base score is 5.3 (medium), reflecting the lack of confidentiality impact but the presence of integrity risk and ease of remote exploitation without authentication or user interaction. No known exploits are currently reported in the wild. The vulnerability highlights the risk of trusting user-controlled parameters in session management and the importance of input validation and secure session file handling.

Potential Impact

For European organizations using Craft CMS, this vulnerability poses a moderate risk primarily to the integrity of web applications. Attackers can inject arbitrary content into session files, potentially leading to code execution if chained with other vulnerabilities. This could result in unauthorized modification of website behavior, defacement, or further compromise of backend systems. Although there is no direct confidentiality or availability impact, the integrity compromise can undermine trust in affected websites and lead to reputational damage. Organizations relying on Craft CMS for critical web services or e-commerce may face business disruption and customer trust issues if exploited. The vulnerability’s ease of exploitation without authentication increases risk, especially for public-facing web servers. Given the widespread use of PHP-based CMS platforms in Europe, the threat is relevant to many small and medium enterprises as well as larger organizations. Prompt patching is essential to mitigate potential exploitation and prevent attackers from leveraging this vulnerability in multi-stage attacks.

Mitigation Recommendations

European organizations should immediately upgrade Craft CMS installations to versions 5.7.5 or 4.15.3 or later, where the vulnerability is fixed. In addition to patching, organizations should audit session management configurations to ensure session files are stored securely with appropriate permissions to prevent unauthorized access or modification. Implement strict input validation and sanitization for all user-controllable parameters, especially those stored in sessions or used in file paths. Employ web application firewalls (WAFs) to detect and block suspicious requests attempting to inject malicious parameters. Monitor server logs for unusual session file modifications or unexpected 'Set-Cookie' header values. Conduct regular security assessments and penetration tests focusing on session handling and parameter injection vectors. Where possible, isolate session storage from web root directories to reduce risk of code execution. Educate developers on secure coding practices related to session management and parameter handling to prevent similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.329Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecb6e

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 10/21/2025, 9:16:38 PM

Last updated: 11/22/2025, 1:19:28 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats