logo

CVE-2025-54417 craftcms/cms

Package

Manager: composer
Name: craftcms/cms
Vulnerable Version: >=4.13.8 <4.16.3 || >=5.5.8 <5.8.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

EPSS: 0.00053 pctl0.16373

Details

Craft CMS has a theoretical bypass for CVE-2025-23209 **Pre-requisites:** * Have a compromised security key (https://craftcms.com/knowledge-base/securing-craft#keep-your-secrets-secret) * Somehow, manage to create an arbitrary file in Craft’s `/storage/backups` folder. With those two pieces in place, you could create a specific, malicious request to the `/updater/restore-db` endpoint to execute CLI commands remotely. Fixed in https://github.com/craftcms/cms/commit/a19d46be78a9ca1ea474012a10e97bed0d787f57 ----- Reported by Marco O. (segfault)

Metadata

Created: 2025-08-08T19:32:50Z
Modified: 2025-08-11T13:56:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-2vcf-qxv3-2mgw/GHSA-2vcf-qxv3-2mgw.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-2vcf-qxv3-2mgw
Finding: F422
Auto approve: 1