Craft CMS Twig Template Injection RCE via FTP Templates Path
Title source: metasploitDescription
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
Exploits (4)
nomisec
WORKING POC
4 stars
by Sachinart · remote
https://github.com/Sachinart/CVE-2024-56145-craftcms-rce
metasploit
WORKING POC
EXCELLENT
by jheysel-r7, Valentin Lobstein, AssetNote · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/craftcms_ftp_template.rb
Nuclei Templates (1)
Craft CMS - Remote Code Execution via Template Path Manipulation
CRITICALVERIFIEDby jackhax
Shodan:
http.html:"craftcms" || http.favicon.hash:"-47932290"
FOFA:
icon_hash=-47932290 || body=craftcms
References (4)
Scores
CVSS v3
9.8
EPSS
0.9415
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CISA KEV
2025-06-02
VulnCheck KEV
2025-05-27
ENISA EUVD
EUVD-2024-3545
CWE
CWE-94
Status
published
Products (2)
craftcms/cms
5.0.0-RC1 - 5.5.2Packagist
craftcms/craft_cms
3.0.0 - 3.9.14
Published
Dec 18, 2024
KEV Added
Jun 02, 2025
Tracked Since
Feb 18, 2026