Description

Hackers are actively exploiting two critical zero-day vulnerabilities in Craft CMS to gain unauthorized access to web servers. The flaws, first identified by Orange Cyberdefense SensePost on February 14, 2025, have been used in a series of targeted attacks. The campaign chains together two serious vulnerabilities: CVE-2024-58136, a flaw in the Yii PHP framework used by Craft CMS that allows unauthorized access to restricted paths (a regression of CVE-2024-4990), and CVE-2025-32432, a remote code execution (RCE) vulnerability affecting Craft CMS versions prior to 3.9.15, 4.14.15, and 5.6.17.These vulnerabilities enable attackers to run unauthorized code on compromised systems without needing to log in or provide valid credentials. CVE-2025-32432 specifically resides in Craft CMS's image transformation feature, which enables site administrators to standardize image formats. The vulnerability stems from how POST requests to the image transformation endpoint are handled. These security issues permit threat actors to carry out code execution on vulnerable servers without any form of user authentication. However, in versions 4.x and 5.x, this validation takes place only after the transformation object has already been created.This discrepancy allows attackers to brute-force asset IDs by sending repeated POST requests. Once a valid asset ID is identified, attackers use a Python script to test for vulnerability and, if successful, download a malicious PHP file from a GitHub repository onto the compromised server. The threat actors behind these attacks have been observed refining their methods over several days. Initially, they attempted to upload a file named `filemanager.php`, which was later renamed to `autoload_classmap.php` and first used in attacks on February 14. Organizations using Craft CMS are urged to patch their systems, monitor for signs of compromise, and take precautionary steps such as resetting user credentials, rotating database passwords, and blocking suspicious traffic at the firewall. This advisory comes amid reports of another actively exploited flaw, CVE-2025-42599, in Active! Mail software, underscoring the growing threat of zero-day vulnerabilities being leveraged in real-world attacks.