
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-32432 is a critical remote code execution (RCE) vulnerability affecting Craft CMS, a flexible content management system. The vulnerability impacts versions from 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17. Discovered in April 2025, this high-impact, low-complexity vulnerability has been assigned a CVSS score of 10.0 (Critical) and has been actively exploited in the wild (NVD, Wiz).
The vulnerability resides in a built-in image transformation feature that allows site administrators to manage image formats. The flaw stems from improper validation where an unauthenticated user can send a POST request to the /actions/assets/generate-transform endpoint, with the data in the POST request being interpreted by the server. The exploitation requires finding a valid asset ID first, after which attackers can execute arbitrary code through specially crafted requests (SensePost, HackerNews).
When successfully exploited, the vulnerability allows attackers to achieve remote code execution on affected servers without requiring authentication. Attackers can gain unauthorized access to servers, install malicious PHP files, and potentially gain full control over the compromised systems. As of April 2025, approximately 13,000 Craft CMS instances were identified as vulnerable, with nearly 300 reportedly compromised (HackerNews, Censys).
Craft CMS has released patches to address this vulnerability in versions 3.9.15, 4.14.15, and 5.6.17. Organizations are strongly advised to update to these patched versions immediately. For those unable to update immediately, recommended mitigation steps include refreshing security keys using 'php craft setup/security-key', rotating database credentials, forcing password resets for all users, and blocking suspicious POST requests targeting the vulnerable endpoint at the firewall level (Wiz).
The security community has responded with significant concern due to the critical nature of the vulnerability and its active exploitation. Craft CMS has deployed warning banners to affected admin panels and sent emails to all potentially affected license holders with upgrade instructions. The situation remains serious as exploitation attempts continue, with security researchers actively tracking and documenting attack patterns (HackerNews).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”