CVE-2023-41892
CRITICAL EXPLOITED NUCLEICraft CMS unauthenticated Remote Code Execution (RCE)
Title source: metasploitDescription
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
Exploits (7)
nomisec
WORKING POC
11 stars
by 0xfalafel · remote
https://github.com/0xfalafel/CraftCMS_CVE-2023-41892
nomisec
SUSPICIOUS
by CERTologists · poc
https://github.com/CERTologists/HTTP-Request-for-PHP-object-injection-attack-on-CVE-2023-41892
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/craftcms_unauth_rce_cve_2023_41892.rb
Nuclei Templates (1)
CraftCMS < 4.4.15 - Unauthenticated Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:-47932290 || cpe:"cpe:2.3:a:craftcms:craft_cms" || http.html:craftcms
FOFA:
icon_hash=-47932290 || body=craftcms
Scores
CVSS v3
10.0
EPSS
0.9375
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Details
VulnCheck KEV
2024-04-15
CWE
CWE-94
Status
published
Products (2)
craftcms/cms
4.0.0-RC1 - 4.4.15Packagist
craftcms/craft_cms
4.4.0 - 4.4.15
Published
Sep 13, 2023
Tracked Since
Feb 18, 2026