By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution).
This issue affects CrafterCMS: from 4.0.0 through 4.2.2.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-18697 | Crafter Studio Groovy Sandbox Bypass |
![]() |
GHSA-5644-3vgq-2ph5 | Crafter Studio Groovy Sandbox Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of CrafterCMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution). This issue affects CrafterCMS: from 4.0.0 through 4.2.2. | |
Title | Improper Control of Dynamically-Managed Code Resources in Crafter Studio | |
Weaknesses | CWE-913 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: crafter
Published:
Updated: 2025-06-23T20:22:46.218Z
Reserved: 2025-06-19T20:45:58.222Z
Link: CVE-2025-6384

Updated: 2025-06-23T20:22:41.611Z

Status : Awaiting Analysis
Published: 2025-06-19T21:15:27.390
Modified: 2025-06-23T20:16:40.143
Link: CVE-2025-6384

No data.

Updated: 2025-06-20T15:42:51Z