CVE-2023-43661
PHP vulnerability analysis and mitigation

Overview

CVE-2023-43661 affects Cachet, an open-source status page system. The vulnerability was discovered in versions prior to the 2.4 branch, where a template functionality allowing users to create templates could be exploited to execute arbitrary code on the server due to inadequate filtration and an outdated Twig version. The issue was disclosed on October 11, 2023, and was patched in commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 of the 2.4 branch (GitHub Advisory, NVD).

Technical details

The vulnerability is classified as a Server-Side Template Injection (SSTI) that allows authenticated users to execute arbitrary code. It received a CVSS v3.1 base score of 8.8 HIGH from NIST and 9.1 CRITICAL from GitHub. The vulnerability exists in the template processing mechanism where user input is directly concatenated into templates rather than being passed as data. The issue specifically occurs in the API route for incident creation, where the template functionality fails to properly sanitize user input (Security Online).

Impact

The vulnerability allows attackers to execute arbitrary code on the server through template injection. When successfully exploited, attackers can gain complete control of the server, manipulate template engines, and potentially compromise the entire system. The high severity rating reflects the significant impact on system confidentiality, integrity, and availability (GitHub Advisory).

Mitigation and workarounds

Several mitigation steps have been recommended: 1) Update to the latest version of Twig, 2) Implement proper filtration of user-controlled data using safe patterns, 3) Enable sandboxed Twig mode, and 4) Restrict non-admin users from accessing the vulnerable API endpoint. The vulnerability has been patched in the 2.4 branch with commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23492HIGH8.8
  • PHPPHP
  • pimcore/pimcore
NoYesJan 14, 2026
CVE-2026-23498HIGH7.2
  • PHPPHP
  • shopware/core
NoYesJan 14, 2026
GHSA-595p-g7xc-c333MEDIUM6.9
  • PHPPHP
  • algolia/algoliasearch-magento-2
NoYesJan 14, 2026
CVE-2022-50807MEDIUM6.9
  • PHPPHP
  • concrete5/concrete5
NoNoJan 13, 2026
CVE-2026-0859MEDIUM5.2
  • PHPPHP
  • typo3/cms-core
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management