CVE-2025-68456: CWE-770: Allocation of Resources Without Limits or Throttling in craftcms cms
CVE-2025-68456 is a high-severity vulnerability in Craft CMS versions 3. 0. 0 through 4. 16. 16 and 5. 0. 0-RC1 through 5. 8. 20 that allows unauthenticated users to trigger database backup operations. This can lead to resource exhaustion or potential information disclosure due to lack of limits or throttling on resource allocation.
AI Analysis
Technical Summary
CVE-2025-68456 is a vulnerability in Craft CMS, a popular platform for building digital experiences, affecting versions 3.0.0 through 4.16.16 and 5.0.0-RC1 through 5.8.20. The flaw arises from the system allowing unauthenticated users to initiate database backup operations via specific administrative actions without any throttling or resource allocation limits. This can lead to resource exhaustion, potentially causing denial of service (DoS) conditions, or may expose sensitive information through unintended data queries. The vulnerability is classified under CWE-770, which involves allocation of resources without limits or throttling, and CWE-202, which concerns exposure of sensitive information through data queries. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but requires partial attack complexity (AC:L) and partial attack vector (AT:P). The impact on confidentiality and availability is high, while integrity is not affected. No known exploits have been reported in the wild yet, but the potential for abuse exists due to the unauthenticated nature of the attack vector. The recommended remediation is to upgrade to patched versions 5.8.21 or 4.16.17 or later, with Craft 3 users advised to move to the latest Craft 4 or 5 releases that include the fix. Additionally, monitoring and limiting resource-intensive operations at the infrastructure level can help mitigate exploitation risks.
Potential Impact
For European organizations, this vulnerability poses a significant risk of service disruption through resource exhaustion, which can degrade or deny access to critical digital experience platforms built on Craft CMS. The potential for information disclosure could also lead to leakage of sensitive business or customer data, impacting confidentiality and regulatory compliance, especially under GDPR. Organizations relying heavily on Craft CMS for content management and customer engagement may face operational downtime, reputational damage, and increased incident response costs. The unauthenticated nature of the exploit increases the attack surface, allowing remote attackers to trigger the vulnerability without credentials, thus raising the urgency for patching. Given the high CVSS score and the critical role of CMS platforms in digital infrastructure, the impact on availability and confidentiality is substantial. European entities in sectors such as e-commerce, media, and government services using Craft CMS are particularly vulnerable to disruptions and data exposure.
Mitigation Recommendations
1. Immediately upgrade affected Craft CMS installations to versions 5.8.21, 4.16.17, or later, or migrate Craft 3 instances to the latest Craft 4 or 5 releases containing the fix. 2. Implement rate limiting and throttling on administrative endpoints, especially those triggering resource-intensive operations like database backups, to prevent abuse. 3. Monitor logs and network traffic for unusual or repeated backup operation requests originating from unauthenticated sources. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting backup functionalities. 5. Restrict access to administrative interfaces via IP whitelisting or VPNs to reduce exposure to unauthenticated attackers. 6. Conduct regular security audits and penetration testing focused on resource exhaustion and information disclosure vectors. 7. Ensure backup operations are secured and isolated to prevent cascading resource exhaustion affecting other services. 8. Educate development and operations teams about the vulnerability and the importance of timely patching and monitoring.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Italy
CVE-2025-68456: CWE-770: Allocation of Resources Without Limits or Throttling in craftcms cms
Description
CVE-2025-68456 is a high-severity vulnerability in Craft CMS versions 3. 0. 0 through 4. 16. 16 and 5. 0. 0-RC1 through 5. 8. 20 that allows unauthenticated users to trigger database backup operations. This can lead to resource exhaustion or potential information disclosure due to lack of limits or throttling on resource allocation.
AI-Powered Analysis
Technical Analysis
CVE-2025-68456 is a vulnerability in Craft CMS, a popular platform for building digital experiences, affecting versions 3.0.0 through 4.16.16 and 5.0.0-RC1 through 5.8.20. The flaw arises from the system allowing unauthenticated users to initiate database backup operations via specific administrative actions without any throttling or resource allocation limits. This can lead to resource exhaustion, potentially causing denial of service (DoS) conditions, or may expose sensitive information through unintended data queries. The vulnerability is classified under CWE-770, which involves allocation of resources without limits or throttling, and CWE-202, which concerns exposure of sensitive information through data queries. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but requires partial attack complexity (AC:L) and partial attack vector (AT:P). The impact on confidentiality and availability is high, while integrity is not affected. No known exploits have been reported in the wild yet, but the potential for abuse exists due to the unauthenticated nature of the attack vector. The recommended remediation is to upgrade to patched versions 5.8.21 or 4.16.17 or later, with Craft 3 users advised to move to the latest Craft 4 or 5 releases that include the fix. Additionally, monitoring and limiting resource-intensive operations at the infrastructure level can help mitigate exploitation risks.
Potential Impact
For European organizations, this vulnerability poses a significant risk of service disruption through resource exhaustion, which can degrade or deny access to critical digital experience platforms built on Craft CMS. The potential for information disclosure could also lead to leakage of sensitive business or customer data, impacting confidentiality and regulatory compliance, especially under GDPR. Organizations relying heavily on Craft CMS for content management and customer engagement may face operational downtime, reputational damage, and increased incident response costs. The unauthenticated nature of the exploit increases the attack surface, allowing remote attackers to trigger the vulnerability without credentials, thus raising the urgency for patching. Given the high CVSS score and the critical role of CMS platforms in digital infrastructure, the impact on availability and confidentiality is substantial. European entities in sectors such as e-commerce, media, and government services using Craft CMS are particularly vulnerable to disruptions and data exposure.
Mitigation Recommendations
1. Immediately upgrade affected Craft CMS installations to versions 5.8.21, 4.16.17, or later, or migrate Craft 3 instances to the latest Craft 4 or 5 releases containing the fix. 2. Implement rate limiting and throttling on administrative endpoints, especially those triggering resource-intensive operations like database backups, to prevent abuse. 3. Monitor logs and network traffic for unusual or repeated backup operation requests originating from unauthenticated sources. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting backup functionalities. 5. Restrict access to administrative interfaces via IP whitelisting or VPNs to reduce exposure to unauthenticated attackers. 6. Conduct regular security audits and penetration testing focused on resource exhaustion and information disclosure vectors. 7. Ensure backup operations are secured and isolated to prevent cascading resource exhaustion affecting other services. 8. Educate development and operations teams about the vulnerability and the importance of timely patching and monitoring.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-17T20:22:35.081Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c39ba3839e4417594b416
Added to database: 1/5/2026, 10:22:50 PM
Last enriched: 1/13/2026, 1:00:54 AM
Last updated: 2/5/2026, 6:38:36 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
HighCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
HighCVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html
HighCVE-2025-15557: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo H100 v1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.