Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-crcq-738g-pqvc

Опубликовано: 25 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.6

Описание

Craft CMS Potential Remote Code Execution via Twig SSTI

Note that users must have administrator access to the Craft Control Panel, and allowAdminChanges must be enabled for this to work, which is against Craft CMS' recommendations for any non-dev environment.

https://craftcms.com/knowledge-base/securing-craft#set-allowAdminChanges-to-false-in-production

Note: This is a follow-up to GHSA-f3cw-hg6r-chfv

Users should update to the patched versions (4.16.6 and 5.8.7) to mitigate the issue.

Resources: https://github.com/craftcms/cms/pull/17612

Пакеты

Наименование

craftcms/cms

composer
Затронутые версииВерсия исправления

>= 4.0.0-RC1, <= 4.16.5

4.16.6

Наименование

craftcms/cms

composer
Затронутые версииВерсия исправления

>= 5.0.0-RC1, <= 5.8.6

5.8.7

EPSS

Процентиль: 54%
0.00317
Низкий

6.6 Medium

CVSS4

Дефекты

CWE-1336
CWE-22
CWE-94

Связанные уязвимости

CVSS3: 7.2
nvd
6 месяцев назад

Craft is a platform for creating digital experiences. From versions 4.0.0-RC1 to 4.16.5 and 5.0.0-RC1 to 5.8.6, there is a potential remote code execution vulnerability via Twig SSTI (Server-Side Template Injection). This is a follow-up to CVE-2024-52293. This vulnerability has been patched in versions 4.16.6 and 5.8.7.

EPSS

Процентиль: 54%
0.00317
Низкий

6.6 Medium

CVSS4

Дефекты

CWE-1336
CWE-22
CWE-94