CVE-2025-68455
Unknown Unknown - Not Provided
Authenticated Remote Code Execution in Craft CMS via Malicious Behavior

Publication date: 2026-01-05

Last updated on: 2026-01-05

Assigner: GitHub, Inc.

Description
Craft is a platform for creating digital experiences. Versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16 are vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior. Note that attackers must have administrator access to the Craft Control Panel for this to work. Users should update to the patched versions (5.8.21 and 4.16.17) to mitigate the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-01-05
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
craftcms craft From 5.0.0-rc1 (inc) to 5.8.20 (inc)
craftcms craft From 4.0.0-rc1 (inc) to 4.16.16 (inc)
craftcms craft 5.8.21
craftcms craft 4.16.17
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-470 The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the Craft platform versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16. It allows a potential authenticated Remote Code Execution (RCE) attack via a malicious attached Behavior. However, the attacker must have administrator access to the Craft Control Panel for this exploit to work. The issue can be mitigated by updating to the patched versions 5.8.21 and 4.16.17.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker with administrator access to execute arbitrary code remotely on the affected system. This could lead to full system compromise, unauthorized data access, data modification, or disruption of services.


What immediate steps should I take to mitigate this vulnerability?

Users should update Craft to the patched versions 5.8.21 or 4.16.17 to mitigate the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart