Remote Code Execution via unrestricted file extension in Craft CMS
CVE-2023-32679

7.2HIGH

Key Information:

Vendor
Craftcms
Status
Vendor
CVE Published:
19 May 2023

Summary

Craft CMS, an open-source content management system by Pixel & Tonic, is vulnerable to a Remote Code Execution exploit due to an unrestricted file extension issue. In specific versions, the function responsible for verifying template existence does not adequately check file extensions when the 'name' parameter is provided. This flaw allows an attacker with admin privileges in a development or misconfigured environment to execute arbitrary code on the server, potentially granting access to the host operating system. Users should upgrade to version 4.4.6 or later to mitigate this vulnerability, as there are no known workarounds.

Affected Version(s)

cms >= 4.0.0, < 4.4.6

References

EPSS Score

21% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-32679 : Remote Code Execution via unrestricted file extension in Craft CMS | SecurityVulnerability.io