CVE-2025-68456
📋 TL;DR
Unauthenticated attackers can trigger database backup operations in vulnerable Craft CMS versions, potentially causing resource exhaustion or exposing sensitive database information. This affects Craft CMS versions 5.0.0-RC1 through 5.8.20 and 3.0.0 through 4.16.16. All users running these versions are vulnerable.
💻 Affected Systems
- Craft CMS
📦 What is this software?
Craft Cms by Craftcms
Craft Cms by Craftcms
Craft Cms by Craftcms
Craft Cms by Craftcms
⚠️ Risk & Real-World Impact
Worst Case
Complete system resource exhaustion leading to denial of service, or exposure of sensitive database information including credentials and user data.
Likely Case
Resource exhaustion causing service disruption and potential exposure of non-sensitive database information.
If Mitigated
Minimal impact with proper network segmentation and access controls limiting unauthenticated admin access.
🎯 Exploit Status
Exploitation requires specific admin actions but no authentication, making it relatively simple to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.8.21 and 4.16.17
Vendor Advisory: https://github.com/craftcms/cms/security/advisories/GHSA-v64r-7wg9-23pr
Restart Required: Yes
Instructions:
1. Backup your database and files. 2. Update Craft CMS to version 5.8.21 (for Craft 5) or 4.16.17 (for Craft 4). 3. For Craft 3 users, upgrade to Craft 4 or 5 first. 4. Restart your web server. 5. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Admin Access
allBlock unauthenticated access to admin endpoints using web server rules or firewall.
# Apache: RewriteRule ^/admin - [F]
# Nginx: location ~ ^/admin { deny all; }
🧯 If You Can't Patch
- Implement strict network access controls to limit admin panel access to trusted IPs only.
- Monitor server resources and database backup operations for unusual activity.
🔍 How to Verify
Check if Vulnerable:
Check your Craft CMS version in the admin panel or via composer show craftcms/craft.
Check Version:
composer show craftcms/craft | grep versions
Verify Fix Applied:
Confirm version is 5.8.21 or higher (for Craft 5) or 4.16.17 or higher (for Craft 4).
📡 Detection & Monitoring
Log Indicators:
- Unusual database backup operations
- Unauthenticated requests to admin endpoints
- High resource usage spikes
Network Indicators:
- HTTP requests to /admin/* endpoints from unauthenticated sources
- Large database export traffic
SIEM Query:
source="web_logs" AND (uri_path="/admin/*" AND http_status=200) AND NOT user_agent="*bot*"