Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
Reference:
Advisory #2025-40
Version:
1.0
Affected software:
Craft CMS
• Versions 4.0.0-RC1 through 4.13.7
• Versions 5.0.0-RC1 through 5.5.4
Type:
Remote Code Execution, RCE
CVE/CVSS:
CVE-2025-23209: CVSS 8.0 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
CraftCMS - https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x
CVE-2025-23209 is a critical remote code execution (RCE) vulnerability identified in Craft CMS versions 4 and 5. This vulnerability becomes exploitable when an attacker’s security key has been compromised, allowing unauthorized individuals to execute arbitrary code within the Craft CMS environment. The issue arises from improper control over code generation, leading to potential code injection attacks.
Installations are at risk if they are running unpatched versions and the security key has been compromised. It’s important to note that the vulnerability is contingent upon prior compromise of the security key; without this, the exploit cannot be executed. It's currently not clear how the user security keys were compromised, and in what context.
CISA has reported active exploitation of this vulnerability and included it in its KEV list.
CVE-2025-23209 is a critical vulnerability which impacts Craft CMS versions 4 and 5. It was addressed by the project maintainers in late December 2024 in versions 4.13.8 and 5.5.8. The vulnerability is actively exploited in the wild.
Exploiting this vulnerability can result in Remote Code Execution (RCE). However, exploiting this vulnerability requires that the security key has already been compromised. Currently, it's unclear how the security keys were compromised. If you can't update to a patched version, rotating your security key and ensuring its privacy will help mitigate the issue.
The vulnerability affects the following versions of Craft CMS:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
WNE Security - https://wnesecurity.com/cve-2025-23209-craft-cms-code-injection-vulnerability/
TheHackerNews - https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html
CraftCMS - https://craftcms.com/knowledge-base/securing-craft#keep-your-secrets-secret