CVE-2025-23209: Craft CMS has a potential RCE with a compromised security key
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88229%
CWE
Published
1/21/2025
Updated
1/21/2025
KEV Status
Yes
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| craftcms/cms | composer | >= 5.0.0-RC1, < 5.5.5 | 5.5.8 |
| craftcms/cms | composer | >= 4.0.0-RC1, < 4.13.8 | 4.13.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient validation in the database restoration process. The commit diff shows added path validation using FileHelper::isWithin, indicating the original code accepted user-controlled 'dbBackupPath' without checks. With a compromised security key, attackers could forge signed requests to execute arbitrary code through malicious database restore operations. The CWE-94 classification and patch context confirm this is a code injection vector via uncontrolled path input.