Craft is a platform for creating digital experiences. Versions 4.13.8 through 4.16.2 and 5.5.8 through 5.8.3 contain a vulnerability that can bypass CVE-2025-23209: "Craft CMS has a potential RCE with a compromised security key". To exploit this vulnerability, the project must meet these requirements: have a compromised security key and create an arbitrary file in Craft's /storage/backups folder. With those criteria in place, attackers could create a specific, malicious request to the /updater/restore-db endpoint and execute CLI commands remotely. This issue is fixed in versions 4.16.3 and 5.8.4.

Project Subscriptions

Vendors Products
Craftcms Subscribe
Craft Cms Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-24040 Craft CMS has a theoretical bypass for CVE-2025-23209
Github GHSA Github GHSA GHSA-2vcf-qxv3-2mgw Craft CMS has a theoretical bypass for CVE-2025-23209
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 02 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms
Craftcms craft Cms
Vendors & Products Craftcms
Craftcms craft Cms

Mon, 11 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 09 Aug 2025 01:45:00 +0000

Type Values Removed Values Added
Description Craft is a platform for creating digital experiences. Versions 4.13.8 through 4.16.2 and 5.5.8 through 5.8.3 contain a vulnerability that can bypass CVE-2025-23209: "Craft CMS has a potential RCE with a compromised security key". To exploit this vulnerability, the project must meet these requirements: have a compromised security key and create an arbitrary file in Craft's /storage/backups folder. With those criteria in place, attackers could create a specific, malicious request to the /updater/restore-db endpoint and execute CLI commands remotely. This issue is fixed in versions 4.16.3 and 5.8.4.
Title Craft contains a theoretical bypass for CVE-2025-23209
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 5.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-08-11T13:38:51.609Z

Reserved: 2025-07-21T23:18:10.281Z

Link: CVE-2025-54417

cve-icon Vulnrichment

Updated: 2025-08-11T13:38:26.737Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-09T02:15:37.550

Modified: 2025-09-02T19:23:07.853

Link: CVE-2025-54417

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-12T11:47:10Z

Weaknesses