CVE-2025-68455
Authenticated Remote Code Execution in Craft CMS via Malicious Behavior
Publication date: 2026-01-05
Last updated on: 2026-01-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| craftcms | craft | From 5.0.0-rc1 (inc) to 5.8.20 (inc) |
| craftcms | craft | From 4.0.0-rc1 (inc) to 4.16.16 (inc) |
| craftcms | craft | 5.8.21 |
| craftcms | craft | 4.16.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-470 | The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the Craft platform versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16. It allows a potential authenticated Remote Code Execution (RCE) attack via a malicious attached Behavior. However, the attacker must have administrator access to the Craft Control Panel for this exploit to work. The issue can be mitigated by updating to the patched versions 5.8.21 and 4.16.17.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with administrator access to execute arbitrary code remotely on the affected system. This could lead to full system compromise, unauthorized data access, data modification, or disruption of services.
What immediate steps should I take to mitigate this vulnerability?
Users should update Craft to the patched versions 5.8.21 or 4.16.17 to mitigate the issue.