CVE-2025-23209

HIGH
2025-01-18 [email protected]
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 18:04 vuln.today
Patch Released
Mar 28, 2026 - 18:04 nvd
Patch available
Added to CISA KEV
Oct 24, 2025 - 13:59 cisa
CISA KEV
CVE Published
Jan 18, 2025 - 01:15 nvd
HIGH 8.0

Description

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.

Analysis

Craft CMS 4 and 5 contain a remote code execution vulnerability exploitable when the application's security key has been compromised, allowing attackers with the key to execute arbitrary code on the server.

Technical Context

The CWE-94 code injection requires knowledge of the Craft CMS security key (used for signing cookies and tokens). With the key, attackers can craft signed payloads that the CMS trusts and processes, leading to PHP code execution.

Affected Products

['Craft CMS 4 (affected versions)', 'Craft CMS 5 (affected versions)']

Remediation

Update Craft CMS. Rotate the security key immediately. Ensure .env files are not publicly accessible. Check git repositories for accidentally committed secrets.

Priority Score

109
Low Medium High Critical
KEV: +50
EPSS: +19.1
CVSS: +40
POC: 0

Share

CVE-2025-23209 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy