CVE-2025-0502

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to access private files and directories in CrafterCMS through improper resource handling. It affects all CrafterCMS Engine deployments running vulnerable versions on multiple platforms. Attackers can potentially leak sensitive configuration files, source code, or user data.

💻 Affected Systems

Products:
  • CrafterCMS Engine
Versions: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all architectures (x86, x64, ARM) and requires CrafterCMS Engine to be running with vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through exposure of sensitive configuration files, database credentials, or authentication secrets leading to data breach and unauthorized administrative access.

🟠

Likely Case

Exposure of sensitive files including configuration data, source code, or user-uploaded content that could facilitate further attacks or data theft.

🟢

If Mitigated

Limited exposure of non-critical files if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory indexing vulnerabilities typically require minimal technical skill to exploit via web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8 or 4.1.6

Vendor Advisory: https://craftercms.com/docs/current/security/advisory.html#cv-2025011501

Restart Required: Yes

Instructions:

1. Backup your CrafterCMS instance. 2. Upgrade to CrafterCMS 4.0.8 if on 4.0.x series. 3. Upgrade to CrafterCMS 4.1.6 if on 4.1.x series. 4. Restart the CrafterCMS service. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Web Server Access Restrictions

all

Configure web server (Apache/Nginx) to block directory indexing and restrict access to sensitive paths

# Apache: Options -Indexes in .htaccess or httpd.conf
# Nginx: autoindex off; in server block configuration

Network Access Control

linux

Restrict access to CrafterCMS admin and API interfaces to trusted IP ranges only

# Example iptables rule: iptables -A INPUT -p tcp --dport 8080 -s TRUSTED_IP -j ACCEPT
# Then: iptables -A INPUT -p tcp --dport 8080 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to CrafterCMS instances
  • Deploy a web application firewall (WAF) with rules to detect and block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check CrafterCMS version via admin interface or by examining installation directory version files

Check Version:

Check CrafterCMS admin dashboard or examine craftercms-version.txt in installation directory

Verify Fix Applied:

Confirm version is 4.0.8 or higher (for 4.0.x) or 4.1.6 or higher (for 4.1.x) after upgrade

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to directories, multiple 200/403 responses for directory paths, requests with '../' patterns

Network Indicators:

  • HTTP requests attempting directory traversal patterns, unusual access to admin/API endpoints

SIEM Query:

web_access_logs | where url contains ".." or url contains "directory" or url contains "index" | where response_code = 200

🔗 References

📤 Share & Export