CVE-2024-56145

RCE when PHP `register_argc_argv` config setting is enabled in craftcms/cms

Basic Information

CVE State
PUBLISHED
Reserved Date
December 16, 2024
Published Date
December 18, 2024
Last Updated
June 06, 2025
Vendor
craftcms
Product
cms
Description
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
Tags
cisa metasploit_scanner php nuclei_scanner

CVSS Scores

CVSS v4.0

9.3 - CRITICAL

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS Score

Score
94.03% (Percentile: 99.88%) as of 2025-06-14

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-05-30 00:00:00 UTC) Source
Seen in APT Campaigns
Yes (added 2025-05-30 00:00:00 UTC) (Earth Lamia) Source

Known Exploited Vulnerability Information

Source Added Date
TrendMicro 2025-05-30 00:00:00 UTC

Recent Mentions

CISA Adds Five Known Exploited Vulnerabilities to Catalog

Source: All CISA Advisories • Published: 2025-06-02 12:00:00 UTC

CISA added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability CVE-2023-39780 ASUS RT-AX55 Routers OS Command Injection Vulnerability CVE-2024-56145 Craft CMS Code Injection Vulnerability CVE-2025-3935 ConnectWise ScreenConnect Improper Authentication Vulnerability CVE-2025-35939 Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria. Please share your thoughts with us through our anonymous survey. We appreciate your feedback.

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

craftcms_ftp_template

Type: metasploit • Created: Unknown

Metasploit module for CVE-2024-56145

Sachinart/CVE-2024-56145-craftcms-rce

Type: github • Created: 2024-12-22 11:53:04 UTC • Stars: 2

CVE-2024-56145 SSTI to RCE - twig templates

Chocapikk/CVE-2024-56145

Type: github • Created: 2024-12-20 03:34:01 UTC • Stars: 42

Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Detected by Metasploit

  • Used in Earth Lamia APT Campaign

  • Added to KEVIntel