Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Craft CMS RCE exploitation chain to steal data used in zero-day attacks
    Security

    Craft CMS RCE exploitation chain to steal data used in zero-day attacks

    PineapplesUpdateBy PineapplesUpdateApril 26, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Craft CMS RCE exploitation chain to steal data used in zero-day attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Craft CMS RCE exploitation chain to steal data used in zero-day attacks

    According to Certificate Orange Cyberdfs, the two weaknesses affecting the craft CMS were chained together in zero-day attacks to dissolve the server and steal data.

    The weaknesses were discovered by the CSIRT of Orange Cyberfens, which was called to investigate a compromised server.

    As part of the investigation, he found that the two zero-day weaknesses affecting the craft CM were exploited to dissolve the server:

    • Cve-2025-32432: A remote code execution (RCE) vulnerability in the craft CMS.
    • Cve-2024-58136: An input verification defect in the YII structure used by the craft CMS.

    According to a report by the moral hacking team of Orange Cyberdifes, Senspost, the danger actors instigated both these weaknesses together and uploaded a PHP file manager.

    The attack begins with the exploitation of the CVE-2025-32432, which allows the attackers to send a specially designed request in which “Return URL” is saved into a PHP session file as a parameter. The session is sent to the visitor as part of the reaction of the name HTTP request.

    Request to store Return URL in Craft CMS session
    Request to store Return URL in Craft CMS session
    Source: Senspost

    The second phase of the attack took advantage of a defect in the YII Framework (CVE-2024-58136), which the craft uses CMS. To take advantage of this defect, the attacker sent a malicious JSON payload, causing the PHP code to be executed on the server in the session file.

    This allowed the attacker to install PHP-based file manager on the server to compromise further with the system.

    Orange told Bleepingcomputer that he looked at additional compromise stages, including additional uploads of backdoor and data exfoliation. More information about this post exploitation activity will be detailed in an upcoming blog post.

    YII Developers Finally CVE-2024-58136 Flaws Fixed The version was released on 9 April in Yii 2.0.52.

    Craft CMS too Cve-2025-32432 blame fixed Version 3.9.15, 4.14.15, and on 10 April in 5.6.17. While he did not update YII in the latest version at Shilp CMS, Orange says the attack series is still fixed.

    Orange said, “Today, 2.0.51 (weak) is still a default in the craft. However, with CVE-2025-32432 fix, the YII issue may no longer be triggered,” Orange told Bleepingcomputer.

    Craft CMS recommends that if they believe that their site has been compromised then the admins demonstrate the following stages:

    • Refresh your safety key if it is already captured. You can run PHP craft setup/security-key command and copy the Craft_Security_Key environmental variables updated in all production environment.
    • If you have any other private key stored in the form of environmental variables (eg S3 or Strip), fresh them too.
    • Rotate your database credentials.
    • With an abundance of caution, you may want to force all your users to reset your password in the event of compromising your database. You can do this by running PHP Craft Resave/Users -Set Passomereshetraquired -Se “FN () => True”.

    For complete indicators of the agreement, including IP address and file name, you can See appendix In Senspost’s report.

    In February, CISA also tagged a code injection (RCE) defect, which was exploited in Craft CMS 4 and 5 attacks as CVE-2025-23209.

    attacks chain CMS Craft data exploitation RCE steal zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhat you should know before buying a refurbished gadget
    Next Article Doctor who ‘The Well’ Review: Signing you tell you
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How to Disable ACR on Your TV (And Stop Data Tracking Forever)

    January 13, 2026
    Startups

    Can You Become an AI Data Trainer? How to prepare and what is it worth

    January 3, 2026
    Startups

    Our favorite way to remove your data from the Internet is now at 55% off

    December 2, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.