CVE-2025-32432
PHP vulnerability analysis and mitigation

Overview

CVE-2025-32432 is a critical remote code execution (RCE) vulnerability affecting Craft CMS, a flexible content management system. The vulnerability impacts versions from 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17. Discovered in April 2025, this high-impact, low-complexity vulnerability has been assigned a CVSS score of 10.0 (Critical) and has been actively exploited in the wild (NVD, Wiz).

Technical details

The vulnerability resides in a built-in image transformation feature that allows site administrators to manage image formats. The flaw stems from improper validation where an unauthenticated user can send a POST request to the /actions/assets/generate-transform endpoint, with the data in the POST request being interpreted by the server. The exploitation requires finding a valid asset ID first, after which attackers can execute arbitrary code through specially crafted requests (SensePost, HackerNews).

Impact

When successfully exploited, the vulnerability allows attackers to achieve remote code execution on affected servers without requiring authentication. Attackers can gain unauthorized access to servers, install malicious PHP files, and potentially gain full control over the compromised systems. As of April 2025, approximately 13,000 Craft CMS instances were identified as vulnerable, with nearly 300 reportedly compromised (HackerNews, Censys).

Mitigation and workarounds

Craft CMS has released patches to address this vulnerability in versions 3.9.15, 4.14.15, and 5.6.17. Organizations are strongly advised to update to these patched versions immediately. For those unable to update immediately, recommended mitigation steps include refreshing security keys using 'php craft setup/security-key', rotating database credentials, forcing password resets for all users, and blocking suspicious POST requests targeting the vulnerable endpoint at the firewall level (Wiz).

Community reactions

The security community has responded with significant concern due to the critical nature of the vulnerability and its active exploitation. Craft CMS has deployed warning banners to affected admin panels and sent emails to all potentially affected license holders with upgrade instructions. The situation remains serious as exploitation attempts continue, with security researchers actively tracking and documenting attack patterns (HackerNews).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management