This module exploits an unauthenticated remote code execution vulnerability in Craft CMS versions 3.x, 4.x, and 5.x < 5.6.17 via the image transform endpoint. It injects a PHP Meterpreter payload into the Craft session, then triggers its execution by abusing the Yii behavior gadget chain (PhpManager) on the generate-transform endpoint. Discovered in the wild by Orange Cyberdefense CSIRT and assigned CVE-2025-32432.
Linux,PHP,Unix
php, cmd
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/linux/http/craftcms_preauth_rce_cve_2025_32432
msf exploit(craftcms_preauth_rce_cve_2025_32432) > show targets
...targets...
msf exploit(craftcms_preauth_rce_cve_2025_32432) > set TARGET < target-id >
msf exploit(craftcms_preauth_rce_cve_2025_32432) > show options
...show and set options...
msf exploit(craftcms_preauth_rce_cve_2025_32432) > exploit
Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.
– Jim O’Gorman | President, Offensive Security