CVE-2025-34086:
Bolt CMS vulnerable to authenticated remote code execution
7.5
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
bolt/bolt | composer | <= 3.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the vulnerability was based on the detailed description provided, the referenced exploit from Exploit-DB, and the Metasploit module. The core of the vulnerability is a lack of input sanitization in the user profile's displayname
field, which is handled by Bolt\Controller\Backend\Users::save()
. This allows for the initial code injection. The vulnerability is escalated by other weaknesses in the system, specifically the ability to list session files using Bolt\Controller\Async\Browse::browse()
and the ability to rename and move these files into a web-accessible directory using Bolt\Controller\Async\FilesystemManager::rename()
. This chain of vulnerabilities allows an authenticated user to achieve remote code execution. The identified functions are the key components that enable this attack.
Vulnerable functions
Bolt\Controller\Backend\Users::save
src/Controller/Backend/Users.php
Bolt\Controller\Async\Browse::browse
src/Controller/Async/Browse.php
Bolt\Controller\Async\FilesystemManager::rename
src/Controller/Async/FilesystemManager.php