cognitive cybersecurity intelligence

News and Analysis

Search

CISA Warns of Craft CMS Code Injection Vulnerability Exploited in Attacks

CISA Warns of Craft CMS Code Injection Vulnerability Exploited in Attacks

A critical vulnerability in Craft CMS (CVE-2025-32432) has been added to the Known Exploited Vulnerabilities catalog following confirmed active exploitation in the wild.

Security teams and system administrators are advised to address this issue immediately to prevent severe network compromises.

The vulnerability is a severe code injection flaw, categorized under CWE-94, which involves improper control of code generation.

This type of weakness occurs when a software application fails to properly sanitize or validate user-supplied input before interpreting it as executable instructions.

For Craft CMS, a popular and highly customizable content management system widely used by enterprises, this vulnerability poses a significant risk.

It allows a remote, unauthenticated attacker to execute arbitrary code directly on the underlying server.

Once an attacker successfully achieves remote code execution, they can essentially take complete control over the affected application.

This level of access allows threat actors to modify website content, exfiltrate sensitive database records, or establish a persistent backdoor.

Furthermore, a compromised web server can serve as a strategic launching point for lateral pivoting into an organization’s internal network.

By adding CVE-2025-32432 to the KEV catalog on March 20, 2026, CISA has confirmed that threat actors are actively leveraging this flaw in real-world attacks.

At this time, CISA notes that it remains unknown whether this specific vulnerability is being utilized in ongoing ransomware campaigns.

Code injection and remote code execution vulnerabilities remain highly sought-after by threat actors, including state-sponsored groups and initial access brokers. Organizations relying on Craft CMS must treat this as a high-priority threat.

Unpatched content management systems exposed to the internet are highly visible targets. They are likely already being actively scanned and exploited by automated attack tools.

Mitigations

Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch agencies are legally mandated to remediate this vulnerability to protect federal networks.

CISA has established a strict compliance deadline of April 3, 2026, for federal agencies to apply the necessary mitigations.

While this directive applies only to government entities, CISA strongly urges all private-sector organizations and global enterprises to adopt the same aggressive patching timeline.

System administrators must immediately apply the latest security updates provided in the vendor instructions.

Organizations should also actively monitor their web access logs for any anomalous behavior or unauthorized administrative access attempts.

If applying the official patch is not immediately feasible, organizations must follow applicable cloud service security guidance or temporarily discontinue use of the vulnerable product until secure mitigations are in place.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post CISA Warns of Craft CMS Code Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts