CVE-2023-41892

CRITICAL EXPLOITED NUCLEI

Craft CMS unauthenticated Remote Code Execution (RCE)

Title source: metasploit

Description

Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.

Exploits (7)

nomisec WORKING POC 11 stars
by 0xfalafel · remote
https://github.com/0xfalafel/CraftCMS_CVE-2023-41892
nomisec WORKING POC 5 stars
by diegaccio · remote
https://github.com/diegaccio/Craft-CMS-Exploit
nomisec WORKING POC 3 stars
by zaenhaxor · remote
https://github.com/zaenhaxor/CVE-2023-41892
nomisec WORKING POC
by user01-1 · remote
https://github.com/user01-1/CVE-2023-41892_poc
nomisec SUSPICIOUS
by CERTologists · poc
https://github.com/CERTologists/HTTP-Request-for-PHP-object-injection-attack-on-CVE-2023-41892
nomisec WORKING POC
by acesoyeo · local
https://github.com/acesoyeo/CVE-2023-41892
metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/craftcms_unauth_rce_cve_2023_41892.rb

Nuclei Templates (1)

CraftCMS < 4.4.15 - Unauthenticated Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:-47932290 || cpe:"cpe:2.3:a:craftcms:craft_cms" || http.html:craftcms
FOFA: icon_hash=-47932290 || body=craftcms

Scores

CVSS v3 10.0
EPSS 0.9375
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

Details

VulnCheck KEV 2024-04-15
CWE
CWE-94
Status published
Products (2)
craftcms/cms 4.0.0-RC1 - 4.4.15Packagist
craftcms/craft_cms 4.4.0 - 4.4.15
Published Sep 13, 2023
Tracked Since Feb 18, 2026