Description
Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.
References (4)
Core 4
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw
Patch x_refsource_misc
https://github.com/craftcms/cms/commit/0bd33861abdc60c93209cff03eeee54504d3d3b5
Release Notes x_refsource_misc
https://github.com/craftcms/cms/releases/tag/3.8.15
Release Notes x_refsource_misc
https://github.com/craftcms/cms/releases/tag/4.4.15
Scores
CVSS v3
7.2
EPSS
0.0028
EPSS Percentile
51.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-74
Status
published
Products (3)
craftcms/cms
4.0.0-RC1 - 4.4.15Packagist
craftcms/craft_cms
4.0.0 rc1
craftcms/craft_cms
3.0.0 - 3.8.15
Published
Aug 23, 2023
Tracked Since
Feb 18, 2026