INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 47m Global general Financial Services and E-commerce MEDIUM 49m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 47m Global general Financial Services and E-commerce MEDIUM 49m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 47m Global general Financial Services and E-commerce MEDIUM 49m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2025-68455

High ⚡ Exploit Available
Craft CMS Authenticated Remote Code Execution via Malicious Behavior Attachment (CVE-2025-68455)
CWE-470 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.2
🔗 NVD Official
📄 Description (English)

Craft is a platform for creating digital experiences. Versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16 are vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior. Note that attackers must have administrator access to the Craft Control Panel for this to work. Users should update to the patched versions (5.8.21 and 4.16.17) to mitigate the issue.

🤖 AI Executive Summary

Craft CMS versions 4.0.0-RC1 through 4.16.16 and 5.0.0-RC1 through 5.8.20 contain an authenticated Remote Code Execution vulnerability (CWE-470) exploitable by attackers with administrator access to the Control Panel. The flaw allows execution of arbitrary code through malicious attached behaviors. Patches are available in versions 4.16.17 and 5.8.21.

📄 Description (Arabic)

تمثل هذه الثغرة الأمنية خطراً كبيراً على المؤسسات التي تستخدم نظام Craft CMS لإدارة المحتوى الرقمي. يستغل المهاجم الذي يمتلك صلاحيات إدارية ثغرة CWE-470 (استخدام غير آمن لمسار خارجي يتحكم فيه المستخدم) لإرفاق سلوكيات برمجية ضارة تؤدي إلى تنفيذ أوامر تعسفية على الخادم. رغم أن الاستغلال يتطلب صلاحيات إدارية مسبقة، إلا أن الثغرة تشكل تهديداً خطيراً في حالات اختراق حسابات المسؤولين أو الهجمات الداخلية. تم تأكيد وجود استغلال عملي للثغرة مما يزيد من خطورتها وضرورة التحديث الفوري.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات نظام إدارة المحتوى Craft CMS من 4.0.0-RC1 حتى 4.16.16 ومن 5.0.0-RC1 حتى 5.8.20 على ثغرة تنفيذ كود عن بعد (CWE-470) يمكن استغلالها من قبل مهاجمين لديهم صلاحيات المسؤول في لوحة التحكم. تسمح الثغرة بتنفيذ كود برمجي تعسفي عبر سلوكيات ضارة مرفقة. تتوفر التحديثات الأمنية في الإصدارات 4.16.17 و 5.8.21.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:32
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Craft CMS for digital content management, particularly in government portals, educational institutions, and corporate websites, face significant risk of complete system compromise if administrator credentials are compromised. This vulnerability could lead to data breaches, service disruption, and non-compliance with NCA ECC and SAMA CSF requirements for secure application development and access control.
🏢 Affected Saudi Sectors
القطاع الحكومي التعليم العالي الإعلام والنشر الرقمي الخدمات المالية الشركات الكبرى التجارة الإلكترونية
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately update Craft CMS to patched versions 4.16.17 (for 4.x branch) or 5.8.21 (for 5.x branch) following vendor security advisories and testing in non-production environments first.
2. Conduct comprehensive audit of all administrator accounts, enforce multi-factor authentication (MFA), review access logs for suspicious behavior attachment activities, and implement principle of least privilege for Control Panel access.
3. Deploy Web Application Firewall (WAF) rules to monitor and restrict file upload and behavior attachment operations, enable detailed logging for all administrative actions, and establish continuous monitoring for unauthorized code execution attempts.
🔧 خطوات المعالجة (العربية)
1. تحديث نظام Craft CMS فوراً إلى الإصدارات المصححة 4.16.17 (لفرع 4.x) أو 5.8.21 (لفرع 5.x) وفقاً لتوجيهات الأمان من المورّد بعد الاختبار في بيئات غير إنتاجية أولاً.
2. إجراء مراجعة شاملة لجميع حسابات المسؤولين وتفعيل المصادقة متعددة العوامل وفحص سجلات الوصول للكشف عن أنشطة مشبوهة لإرفاق السلوكيات وتطبيق مبدأ الصلاحيات الأقل امتيازاً للوصول إلى لوحة التحكم.
3. نشر قواعد جدار حماية تطبيقات الويب لمراقبة وتقييد عمليات رفع الملفات وإرفاق السلوكيات وتفعيل التسجيل التفصيلي لجميع الإجراءات الإدارية وإنشاء مراقبة مستمرة لمحاولات تنفيذ الأكواد غير المصرح بها.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Vulnerability Management) ECC-2-1 (Access Control) ECC-3-1 (System and Application Security) ECC-4-2 (Logging and Monitoring)
🔵 SAMA CSF
CCC-1.1.1 (Asset Management) CCC-2.1.1 (Identity and Access Management) CCC-3.1.1 (Vulnerability Management) CCC-5.1.1 (Security Monitoring)
🟡 ISO 27001:2022
A.12.6.1 (Management of Technical Vulnerabilities) A.9.2.1 (User Registration and De-registration) A.12.4.1 (Event Logging) A.14.2.5 (Secure System Engineering Principles)
📦 Affected Products / CPE 8 entries
craftcms:craft_cms
craftcms:craft_cms
craftcms:craft_cms:4.0.0
craftcms:craft_cms:4.0.0
craftcms:craft_cms:4.0.0
craftcms:craft_cms:4.0.0
craftcms:craft_cms:5.0.0
craftcms:craft_cms:5.0.0
📊 CVSS Score
7.2
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredH — High
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.2
CWECWE-470
EPSS1.13%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available patch-available CWE-470
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.