By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution).
This issue affects CrafterCMS: from 4.0.0 through 4.2.2.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18697 | Crafter Studio Groovy Sandbox Bypass |
Github GHSA |
GHSA-5644-3vgq-2ph5 | Crafter Studio Groovy Sandbox Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of CrafterCMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass Sandbox restrictions and obtain RCE (Remote Code Execution). This issue affects CrafterCMS: from 4.0.0 through 4.2.2. | |
| Title | Improper Control of Dynamically-Managed Code Resources in Crafter Studio | |
| Weaknesses | CWE-913 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: crafter
Published:
Updated: 2025-06-23T20:22:46.218Z
Reserved: 2025-06-19T20:45:58.222Z
Link: CVE-2025-6384
Updated: 2025-06-23T20:22:41.611Z
Status : Awaiting Analysis
Published: 2025-06-19T21:15:27.390
Modified: 2025-06-23T20:16:40.143
Link: CVE-2025-6384
No data.
OpenCVE Enrichment
Updated: 2025-06-20T15:42:51Z
EUVD
Github GHSA