CVE-2023-44382

9.1 CRITICAL

📋 TL;DR

October CMS has a critical vulnerability where authenticated backend users with specific editor permissions can bypass the Twig sandbox and execute arbitrary PHP code even when safe_mode is enabled. This allows privilege escalation and remote code execution. Only affects October CMS installations with authenticated users having editor.cms_pages, editor.cms_layouts, or editor.cms_partials permissions.

💻 Affected Systems

Products:
  • October CMS
Versions: All versions before 3.4.15
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with editor.cms_pages, editor.cms_layouts, or editor.cms_partials permissions. Safe_mode being enabled does NOT protect against this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise - attacker gains full control of the web server, can steal data, deploy malware, or pivot to internal networks.

🟠

Likely Case

Unauthorized PHP code execution leading to data theft, website defacement, or backdoor installation.

🟢

If Mitigated

Limited impact if proper access controls restrict editor permissions to trusted users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific permissions. The advisory includes technical details that could be weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.15

Vendor Advisory: https://github.com/octobercms/october/security/advisories/GHSA-p8q3-h652-65vx

Restart Required: No

Instructions:

1. Backup your October CMS installation and database. 2. Update to version 3.4.15 or later via composer: 'composer require october/october:^3.4.15'. 3. Clear cache: 'php artisan cache:clear'. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict Editor Permissions

all

Temporarily remove editor.cms_pages, editor.cms_layouts, and editor.cms_partials permissions from all non-essential users.

Disable CMS Module

all

Temporarily disable the CMS module if not essential for operations.

🧯 If You Can't Patch

  • Implement strict access controls - only grant editor permissions to absolutely necessary, trusted users.
  • Monitor CMS content changes and user activity logs for suspicious Twig template modifications.

🔍 How to Verify

Check if Vulnerable:

Check October CMS version: 'composer show october/october' or check composer.lock file. If version is below 3.4.15, you are vulnerable.

Check Version:

composer show october/october | grep version

Verify Fix Applied:

Confirm version is 3.4.15 or higher: 'composer show october/october | grep version'. Test that authenticated users with editor permissions cannot execute arbitrary PHP in Twig templates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Twig template modifications by editor users
  • PHP execution attempts in CMS content
  • User permission changes for editor roles

Network Indicators:

  • Unexpected outbound connections from web server
  • Suspicious file uploads to CMS directories

SIEM Query:

source="october_logs" AND (event="template_modification" OR event="php_execution") AND user_role="editor"

🔗 References

📤 Share & Export