CVE-2025-68456

CRITICAL
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 12, 2026 - 18:19 vuln.today
Public exploit code
Patch Released
Jan 12, 2026 - 18:19 nvd
Patch available
CVE Published
Jan 05, 2026 - 22:15 nvd
CRITICAL 9.1

Description

Craft is a platform for creating digital experiences. In versions 5.0.0-RC1 through 5.8.20 and 3.0.0 through 4.16.16, unauthenticated users can trigger database backup operations via specific admin actions, potentially leading to resource exhaustion or information disclosure. Users should update to the patched versions (5.8.21 and 4.16.17) to mitigate the issue. Craft 3 users should update to the latest Craft 4 and 5 releases, which include the fixes.

Analysis

Craft CMS (5.0.0-RC1 through 5.8.20, 3.x through 4.16.16) allows unauthenticated users to trigger database backup operations, leading to resource exhaustion or information disclosure if backups are stored in accessible locations. PoC available, patches available.

Technical Context

Specific admin actions for database backup can be invoked without authentication (CWE-202). If backup files are stored in a web-accessible directory, an attacker can trigger a backup and then download it, obtaining the entire database. Even without file access, repeated backup triggering causes disk exhaustion.

Affected Products

Craft CMS 5.0.0-RC1 through 5.8.20, 3.x through 4.16.16

Remediation

Update to Craft CMS 5.8.21 or 4.16.17. Ensure database backups are stored outside the webroot. Review backup directory for unauthorized files.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +46
POC: +20

Share

CVE-2025-68456 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy