CVE-2025-32432
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Lifecycle Timeline
5Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
Analysis
Craft CMS versions 3.x through 5.x contain a critical remote code execution vulnerability (CVSS 10.0) that allows unauthenticated attackers to execute arbitrary code on the server, actively exploited in the wild before patches were released.
Technical Context
The CWE-94 code injection vulnerability allows unauthenticated attackers to inject and execute arbitrary PHP code through the CMS's request handling. The low-complexity attack vector requires no user interaction or authentication.
Affected Products
['Craft CMS 3.0.0-RC1 to 3.9.14', 'Craft CMS 4.0.0-RC1 to 4.14.14', 'Craft CMS 5.0.0-RC1 to 5.6.16']
Remediation
Immediately update to Craft CMS 3.9.15, 4.14.15, or 5.6.17. Review server logs for signs of exploitation, check for web shells, and audit any content modifications made before patching.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-f3gw-9ww9-jmc3