Hackers are actively exploiting two critical zero-day vulnerabilities in Craft CMS to gain unauthorized access to web servers. The flaws, first identified by Orange Cyberdefense SensePost on February 14, 2025, have been used in a series of targeted attacks. The campaign chains together two serious vulnerabilities: CVE-2024-58136, a flaw in the Yii PHP framework used by Craft CMS that allows unauthorized access to restricted paths (a regression of CVE-2024-4990), and CVE-2025-32432, a remote code execution (RCE) vulnerability affecting Craft CMS versions prior to 3.9.15, 4.14.15, and 5.6.17.These vulnerabilities enable attackers to run unauthorized code on compromised systems without needing to log in or provide valid credentials. CVE-2025-32432 specifically resides in Craft CMS's image transformation feature, which enables site administrators to standardize image formats. The vulnerability stems from how POST requests to the image transformation endpoint are handled. These security issues permit threat actors to carry out code execution on vulnerable servers without any form of user authentication. However, in versions 4.x and 5.x, this validation takes place only after the transformation object has already been created.This discrepancy allows attackers to brute-force asset IDs by sending repeated POST requests. Once a valid asset ID is identified, attackers use a Python script to test for vulnerability and, if successful, download a malicious PHP file from a GitHub repository onto the compromised server. The threat actors behind these attacks have been observed refining their methods over several days. Initially, they attempted to upload a file named `filemanager.php`, which was later renamed to `autoload_classmap.php` and first used in attacks on February 14. Organizations using Craft CMS are urged to patch their systems, monitor for signs of compromise, and take precautionary steps such as resetting user credentials, rotating database passwords, and blocking suspicious traffic at the firewall. This advisory comes amid reports of another actively exploited flaw, CVE-2025-42599, in Active! Mail software, underscoring the growing threat of zero-day vulnerabilities being leveraged in real-world attacks.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...