Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2025-32432: Craft CMS Code Injection Vulnerability
CVE-2025-32432: Craft CMS Code Injection Vulnerability

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2025-32432

CVE-2025-32432: Craft CMS Code Injection Vulnerability

A critical code injection vulnerability in Craft CMS allows unauthenticated remote attackers to execute arbitrary code on affected servers. Added to...

Dylan H.

Security Team

March 20, 2026
6 min read

Affected Products

  • Craft CMS (versions prior to patched release)

Executive Summary

A critical code injection vulnerability (CVE-2025-32432) has been identified in Craft CMS, a widely used PHP-based content management system. The flaw allows a remote, unauthenticated attacker to execute arbitrary code on the server hosting the affected Craft CMS installation.

On March 20, 2026, CISA added CVE-2025-32432 to its Known Exploited Vulnerabilities (KEV) catalog, confirming active in-the-wild exploitation. Federal Civilian Executive Branch (FCEB) agencies are required to remediate the vulnerability by the mandated deadline. All organizations running Craft CMS should treat this as an urgent, high-priority patch.


Vulnerability Overview

AttributeValue
CVE IDCVE-2025-32432
CVSS ScoreCritical
CWECWE-94 — Improper Control of Generation of Code (Code Injection)
TypeRemote Code Injection / RCE
Attack VectorNetwork
Privileges RequiredNone (unauthenticated)
User InteractionNone
VendorCraft CMS
ProductCraft CMS
CISA KEV AddedMarch 20, 2026
Exploitation StatusActively exploited in the wild

Affected Versions

ProductAffected VersionsAction Required
Craft CMSMultiple versions — see vendor advisoryUpdate immediately

Administrators should consult the official Craft CMS security advisory and update to the latest patched release without delay.


Technical Analysis

Root Cause

The vulnerability exists in Craft CMS's handling of user-controlled input that is passed into code generation or execution pathways without sufficient validation or sanitization. This is classified as CWE-94 (Code Injection) — a class of vulnerabilities where attacker-supplied data is interpreted and executed as code by the application.

In Craft CMS's case, the flaw allows an unauthenticated attacker to craft a malicious request that causes the server to execute arbitrary PHP or system-level code, resulting in complete server compromise.

Attack Flow

1. Attacker identifies a publicly reachable Craft CMS installation
2. No authentication or valid account is required
3. Attacker crafts a malicious HTTP request containing an injection payload
4. Craft CMS processes the request and passes attacker-controlled data
   into a code generation or evaluation routine without proper sanitization
5. The injected code executes in the context of the web server process
6. Attacker achieves arbitrary code execution on the underlying server
7. Post-exploitation: webshell deployment, data exfiltration, lateral movement

Why This Is Critical

FactorImpact
No authentication requiredAny internet-connected Craft CMS instance is a valid target
Fully remote exploitationNo physical access or internal network position needed
Code execution, not just data accessAttacker gains process-level control of the server
CISA KEV confirmedActive exploitation is occurring — not just theoretical
Broad CMS install baseCraft CMS is widely deployed across enterprise, media, and government sites

Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull server compromise via injected code
Data ExfiltrationAccess to CMS database, uploaded files, and configured credentials
Webshell InstallationPersistent backdoor for continued unauthorized access
Credential TheftDatabase credentials, API keys, and environment secrets exposed
Lateral MovementCompromised server used as pivot to internal network resources
Content ManipulationDefacement, malicious redirects, or SEO spam injection
Supply Chain RiskSites serving content to end-users can be weaponized for client-side attacks

Immediate Remediation

Step 1: Update Craft CMS Immediately

Apply the latest Craft CMS security update as published in the official Craft CMS changelog and security advisory:

# Update via Composer (recommended method)
composer update craftcms/cms
 
# Verify the installed version after update
php craft --version

Alternatively, use the Craft CMS control panel to apply available updates via Utilities > Updates.

Step 2: Verify Your Installation Is Patched

# Check installed Craft CMS version
composer show craftcms/cms | grep versions
 
# Confirm against the fixed version in the vendor advisory

Step 3: Scan for Indicators of Compromise

# Check for unexpected PHP files in the web root and storage directories
find /path/to/craftcms/ -name "*.php" -newer /path/to/craftcms/composer.json \
  -not -path "*/vendor/*" -not -path "*/storage/runtime/*" -type f
 
# Look for PHP files in upload or storage directories (should not exist)
find /path/to/craftcms/web/uploads/ -name "*.php" -o -name "*.phtml"
find /path/to/craftcms/storage/ -name "*.php" -type f
 
# Review recent web server access logs for anomalous POST requests
grep -E "POST.*(index\.php|actions/)" /var/log/nginx/access.log | tail -200

Step 4: Restrict Access While Patching

If immediate patching is not possible, consider temporarily blocking public access to the Craft CMS control panel and taking the site offline until the patch can be applied:

# Nginx — block Craft CMS admin panel temporarily
location /admin {
    deny all;
    return 403;
}
 
location /index.php/actions {
    deny all;
    return 403;
}

Step 5: Harden the Environment Post-Patching

# Ensure PHP execution is blocked in upload directories
# Add to web server config or .htaccess:
# <FilesMatch "\.php$">
#     Order Deny,Allow
#     Deny from all
# </FilesMatch>
 
# Regenerate Craft CMS security key
php craft setup/security-key
 
# Invalidate all active user sessions
php craft users/invalidate-sessions

Detection Indicators

IndicatorDescription
Unexpected PHP files outside /vendor/ in the Craft rootWebshell installed post-exploitation
PHP files in /web/uploads/ or /storage/ directoriesPost-exploitation persistence
Anomalous POST requests to index.php or actions/ endpointsExploitation attempt
Outbound connections from the PHP/web server processReverse shell or C2 beaconing
New admin or user accounts with recent creation timestampsAttacker persistence
Unexpected cron jobs or scheduled tasksPersistence mechanism
Log entries with unusual encoding or long parameter valuesInjection payload in transit

Post-Remediation Checklist

  1. Update Craft CMS to the latest patched version
  2. Verify the updated version matches the fixed release in the vendor advisory
  3. Audit PHP files across the web root for unexpected additions or modifications
  4. Review admin user accounts — remove any unauthorized accounts
  5. Reset all admin passwords and regenerate the Craft security key
  6. Invalidate all active sessions to force re-authentication of all users
  7. Scan upload and storage directories for PHP files that should not exist
  8. Review access logs for POST requests to Craft action endpoints prior to patching
  9. Deploy a WAF rule to detect and block code injection patterns in HTTP requests
  10. Enable two-factor authentication on all Craft CMS administrator accounts
  11. Notify your incident response team if compromise indicators are found
  12. Monitor for re-exploitation until confirmed patched across all environments

References

  • NVD — CVE-2025-32432
  • CISA Known Exploited Vulnerabilities Catalog
  • Craft CMS Security Advisory
#CVE-2025-32432#Craft CMS#Code Injection#RCE#CISA KEV#Vulnerability#Unauthenticated

Related Articles

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read

CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability allowing a malicious app to cause unexpected changes in...

6 min read
Back to all Security Alerts