CVE-2025-6384 – org.craftercms:crafter-studio
Package
Manager: maven
Name: org.craftercms:crafter-studio
Vulnerable Version: >=4.0.0 <4.3.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00037 pctl0.09723
Details
Crafter Studio Groovy Sandbox Bypass Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of CrafterCMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution). This issue affects CrafterCMS: from 4.0.0 through 4.2.2.
Metadata
Created: 2025-06-19T21:31:20Z
Modified: 2025-06-20T13:28:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-5644-3vgq-2ph5/GHSA-5644-3vgq-2ph5.json
CWE IDs: ["CWE-913"]
Alternative ID: GHSA-5644-3vgq-2ph5
Finding: F039
Auto approve: 1