PT-2025-17927 · Craft · Craft
Nicolas Bourras
+2
·
Published
2025-04-25
·
Updated
2026-03-23
·
CVE-2025-32432
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
Craft versions 3.0.0-RC1 through 3.9.14
Craft versions 4.0.0-RC1 through 4.14.14
Craft versions 5.0.0-RC1 through 5.6.16
Description
Craft CMS is vulnerable to remote code execution. This is a high-impact, low-complexity issue. The Mimo intrusion set has been observed exploiting this vulnerability to deploy webshells, loaders, and proxyware, including the XMRig cryptominer and IPRoyal proxy service. Attackers are utilizing techniques to conceal malicious activity, indicating a focus on financial gain and potential expansion into ransomware. Approximately 13,000 instances are vulnerable, with around 300 already compromised. The vulnerability is related to improper handling of code generation. The exploitation involves sending a specially crafted GET request to deploy a webshell, enabling the execution of arbitrary commands on the compromised server. The attackers employ methods to evade detection, such as using the
alamdar.so library to hide malicious processes.Recommendations
Update Craft CMS to version 3.9.15 or later.
Update Craft CMS to version 4.14.15 or later.
Update Craft CMS to version 5.6.17 or later.
Exploit
Fix
RCE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Craft