Metrics
Affected Vendors & Products
Wed, 04 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Craftcms
Craftcms craft Cms |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* | |
Vendors & Products |
Craftcms
Craftcms craft Cms |
Mon, 02 Jun 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
kev
|
Wed, 28 May 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. | Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. |
Title | Craft CMS stores user-provided content session files | Craft CMS stores user-provided content in session files |
References |
|
Wed, 28 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 May 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. | |
Title | Craft CMS stores user-provided content session files | |
Weaknesses | CWE-472 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-05-07T22:41:29.728Z
Updated: 2025-06-06T03:55:24.443Z
Reserved: 2025-04-15T20:57:14.329Z
Link: CVE-2025-35939

Updated: 2025-05-28T14:17:43.824Z

Status : Analyzed
Published: 2025-05-07T23:15:54.103
Modified: 2025-06-03T20:59:34.117
Link: CVE-2025-35939

No data.