Critical vulnerability (CVSS 9.1) in October CMS allows PHP code execution through Twig sandbox escape. Update to version 3.4.15 for fix.
A critical vulnerability has been identified in October CMS that allows for safe mode bypass using Twig sandbox escape. This CVE has a base severity score of 9.1.
Understanding CVE-2023-44382
This section provides detailed insights into the impact, technical details, and mitigation strategies related to CVE-2023-44382.
What is CVE-2023-44382?
CVE-2023-44382 is a vulnerability in October CMS that enables an authenticated backend user to escape the Twig sandbox and execute arbitrary PHP code, bypassing the
cms.safe_mode
restrictions.
The Impact of CVE-2023-44382
The vulnerability poses a significant risk as it allows attackers with specific permissions to execute malicious PHP code, compromising the confidentiality, integrity, and availability of the system.
Technical Details of CVE-2023-44382
This section covers the vulnerability description, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
October CMS allows authenticated users to execute arbitrary PHP via Twig code, bypassing the safe mode restrictions. The issue has been addressed in version 3.4.15.
Affected Systems and Versions
The vulnerability affects October CMS versions >= 3.0.0 and < 3.4.15.
Exploitation Mechanism
Attackers with specific backend user permissions can leverage Twig code to escape the sandbox and run arbitrary PHP code, exploiting the vulnerability.
Mitigation and Prevention
To safeguard systems from CVE-2023-44382, immediate actions should be taken along with adopting long-term security practices and staying updated with patches.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates