Cyber Posture

CVE-2025-68455

HighPublic PoC

Published: 05 January 2026

Published
05 January 2026
Modified
12 January 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0151 81.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68455 is a high-severity Unsafe Reflection (CWE-470) vulnerability in Craftcms Craft Cms. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 18.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely patching to fixed Craft CMS versions 5.8.21 or 4.16.17 to eliminate the RCE vulnerability.

detect

Vulnerability scanning identifies affected Craft CMS versions in the specified ranges, enabling prioritization for remediation.

prevent

Least privilege limits administrator access to the Craft Control Panel, reducing the attack surface for authenticated exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authenticated RCE in public-facing Craft CMS directly matches exploitation of a vulnerable web application for code execution on the server.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Craft is a platform for creating digital experiences. Versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16 are vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior. Note that attackers must have administrator access to the Craft Control Panel…

more

for this to work. Users should update to the patched versions (5.8.21 and 4.16.17) to mitigate the issue.

Deeper analysisAI

CVE-2025-68455 affects Craft CMS, a platform for creating digital experiences, specifically versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16. The vulnerability enables potential authenticated remote code execution via a malicious attached Behavior and is associated with CWE-470. It has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H), indicating high confidentiality, integrity, and availability impacts under network access with low complexity but requiring high privileges.

Exploitation requires an attacker to have administrator access to the Craft Control Panel. With this access, the attacker can leverage a malicious attached Behavior to achieve remote code execution on the affected system, potentially compromising the server hosting the Craft CMS instance.

Craft CMS advisories and changelog entries recommend updating to patched versions 5.8.21 and 4.16.17 to mitigate the issue. Relevant details are available in the GitHub security advisory (GHSA-255j-qw47-wjh5) and specific commits addressing the vulnerability.

Details

CWE(s)

Affected Products

craftcms
craft cms
4.0.0, 5.0.0 · 4.0.0.1 — 4.16.17 · 5.0.1 — 5.8.21

CVEs Like This One

CVE-2026-25498Same product: Craftcms Craft Cms
CVE-2026-32264Same product: Craftcms Craft Cms
CVE-2026-33157Same product: Craftcms Craft Cms
CVE-2026-32263Same product: Craftcms Craft Cms
CVE-2025-23209Same product: Craftcms Craft Cms
CVE-2026-25495Same product: Craftcms Craft Cms
CVE-2026-28695Same product: Craftcms Craft Cms
CVE-2025-68456Same product: Craftcms Craft Cms
CVE-2026-28783Same product: Craftcms Craft Cms
CVE-2025-68454Same product: Craftcms Craft Cms

References