Craft CMS 5.6.10

CPE Details

Craft CMS 5.6.10
5.6.10
2025-06-10
11h16 +00:00
2025-06-10
11h16 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:craftcms:craft_cms:5.6.10:*:*:*:*:*:*:*

Informations

Vendor

craftcms

Product

craft_cms

Version

5.6.10

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-35939 2025-05-07 22h41 +00:00 Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.
6.9
Moyen
CVE-2025-32432 2025-04-25 15h04 +00:00 Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
10
Critique