Article Details
Scrape Timestamp (UTC): 2025-02-21 07:33:42.684
Source: https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html
Original Article Text
Click to Toggle View
CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks. A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the project maintainers in late December 2024 in versions 4.13.8 and 5.5.8. "Craft CMS contains a code injection vulnerability that allows for remote code execution as vulnerable versions have compromised user security keys," the agency said. The vulnerability affects the following version of the software - In an advisory released on GitHub, Craft CMS noted that all unpatched versions of Craft with a compromised security key are impacted by the security defect. "If you can't update to a patched version, then rotating your security key and ensuring its privacy will help to mitigate the issue," it noted. It's currently not clear how the user security keys were compromised, and in what context. To alleviate the risk posed by the vulnerability, it's recommended that Federal Civilian Executive Branch (FCEB) agencies apply the necessary fixes by March 13, 2025.
Daily Brief Summary
CISA has added a critical vulnerability in Craft CMS to its KEV catalog due to active exploitations.
The vulnerability, identified as CVE-2025-23209, has a high CVSS score of 8.1 and affects versions 4 and 5 of the CMS.
Craft CMS maintenance teams have patched the issue in versions 4.13.8 and 5.5.8.
The flaw enables remote code execution through a code injection vulnerability stemming from compromised user security keys.
It’s advised for all impacted systems to either update to a secured version or rotate and safeguard the existing security keys to mitigate risks.
There’s an ongoing investigation into how the security keys were originally compromised.
Federal Civilian Executive Branch agencies are urged to apply the necessary patches by March 13, 2025, to protect their systems.