TROYANOSYVIRUS
Back to CVEs

CVE-2025-35939

MEDIUMCISA KEV
5.3

Description

Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.

CVE Details

CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/7/2025
Last Modified10/24/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorCraft CMS
ProductCraft CMS
Vulnerability NameCraft CMS External Control of Assumed-Immutable Web Parameter Vulnerability
KEV Date Added2025-06-02
Remediation Due Date2025-06-23
Ransomware UseUnknown

Affected Products

craftcms:craft_cms

Weaknesses (CWE)

CWE-472

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.