We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54417

Craft contains a theoretical bypass for CVE-2025-23209



Description

Craft is a platform for creating digital experiences. Versions 4.13.8 through 4.16.2 and 5.5.8 through 5.8.3 contain a vulnerability that can bypass CVE-2025-23209: "Craft CMS has a potential RCE with a compromised security key". To exploit this vulnerability, the project must meet these requirements: have a compromised security key and create an arbitrary file in Craft's /storage/backups folder. With those criteria in place, attackers could create a specific, malicious request to the /updater/restore-db endpoint and execute CLI commands remotely. This issue is fixed in versions 4.16.3 and 5.8.4.

Reserved 2025-07-21 | Published 2025-08-09 | Updated 2025-08-09 | Assigner GitHub_M


MEDIUM: 5.2CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

>= 4.13.8, < 4.16.3
affected

>= 5.5.8, < 5.8.4
affected

References

github.com/...ms/cms/security/advisories/GHSA-2vcf-qxv3-2mgw

github.com/...ommit/a19d46be78a9ca1ea474012a10e97bed0d787f57

cve.org (CVE-2025-54417)

nvd.nist.gov (CVE-2025-54417)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54417

Support options

Helpdesk Chat, Email, Knowledgebase