Craft CMS 4.13.9

CPE Details

Craft CMS 4.13.9
4.13.9
2025-02-24
12h12 +00:00
2025-02-24
12h12 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:craftcms:craft_cms:4.13.9:*:*:*:*:*:*:*

Informations

Vendor

craftcms

Product

craft_cms

Version

4.13.9

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-35939 2025-05-07 22h41 +00:00 Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.
6.9
Medium
CVE-2025-32432 2025-04-25 15h04 +00:00 Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
10
Critical