Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68455: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms

0
High
VulnerabilityCVE-2025-68455cvecve-2025-68455cwe-470
Published: Mon Jan 05 2026 (01/05/2026, 21:59:00 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

CVE-2025-68455 is a high-severity vulnerability in Craft CMS versions 4. 0. 0-RC1 through 4. 16. 16 and 5. 0. 0-RC1 through 5. 8. 20, allowing authenticated administrators to execute remote code via maliciously crafted Behaviors. The flaw arises from unsafe reflection (CWE-470), where externally controlled input is used to select classes or code, enabling potential Remote Code Execution (RCE).

AI-Powered Analysis

AILast updated: 01/13/2026, 00:59:47 UTC

Technical Analysis

CVE-2025-68455 is a critical vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting Craft CMS, a widely used platform for building digital experiences. The vulnerability exists in versions 4.0.0-RC1 through 4.16.16 and 5.0.0-RC1 through 5.8.20. It allows an attacker with administrator-level access to the Craft Control Panel to execute arbitrary code remotely by attaching a malicious Behavior. Behaviors in Craft CMS are mechanisms that allow dynamic modification or extension of class functionality at runtime. The unsafe reflection flaw means that the system uses external input to determine which classes or code to instantiate or execute without proper validation or sanitization, enabling attackers to inject and run arbitrary code. This can lead to full system compromise, including data theft, service disruption, or pivoting within the network. The vulnerability does not require user interaction and has a network attack vector with low complexity, but it does require high privileges (administrator access). The CVSS 4.0 score is 8.6 (high), reflecting the significant impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the presence of this vulnerability in production environments poses a serious risk. The recommended mitigation is upgrading to patched versions 4.16.17 or 5.8.21, which address the unsafe reflection issue. Additional security measures include restricting administrator access, auditing admin activities, and monitoring for anomalous behavior related to code execution or Behavior attachments.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the security of websites and digital services built on Craft CMS. Successful exploitation could lead to unauthorized remote code execution, resulting in data breaches, defacement, or complete system takeover. This impacts confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution and modification, and availability by potentially disrupting services. Organizations in sectors such as e-commerce, media, government, and digital agencies that rely on Craft CMS for their web infrastructure are particularly at risk. The requirement for administrator access limits the attack surface but also highlights the criticality of protecting privileged accounts. Compromise of an administrator account through phishing or credential theft could enable exploitation. Given the widespread use of Craft CMS in Europe and the critical nature of the vulnerability, the potential operational and reputational damage is substantial.

Mitigation Recommendations

1. Immediately upgrade Craft CMS installations to versions 4.16.17 or 5.8.21 or later, which contain the security fix for this vulnerability. 2. Enforce strict access controls and multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. 3. Regularly audit and monitor administrator activities within the Craft Control Panel for unusual or unauthorized Behavior attachments or code changes. 4. Implement network segmentation and limit administrative access to trusted IP addresses or VPNs to reduce exposure. 5. Conduct security awareness training focused on phishing and credential security to protect administrator accounts. 6. Review and restrict the use of Behaviors in the CMS, ensuring only trusted and necessary extensions are enabled. 7. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious code execution patterns related to this vulnerability. 8. Maintain regular backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-17T20:22:35.081Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c36383839e44175942eb3

Added to database: 1/5/2026, 10:07:52 PM

Last enriched: 1/13/2026, 12:59:47 AM

Last updated: 2/7/2026, 3:51:57 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats