CVE-2025-68436

Face/Off: Hijacking Sensitive Assets via Profile Photos in Craft CMS

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 5, 2026·5 min read·11 visits

Executive Summary (TL;DR)

By exploiting a Mass Assignment flaw in the user profile update logic, an attacker can manipulate the `photoId` parameter. This tricks Craft CMS into believing a restricted file (like a database backup) is the user's new avatar. The system then 'relocates' this sensitive asset into the public-facing profile directory, effectively granting the attacker full read access to files they should never see.

A critical Insecure Direct Object Reference (IDOR) vulnerability combined with Mass Assignment in Craft CMS allows authenticated users to misappropriate any system asset—including private backups and configuration files—by setting it as their profile photo.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Probability
0.04%
Top 100% most exploited
25,000
via Shodan

Affected Systems

Craft CMS 4.x < 4.16.17Craft CMS 5.x < 5.8.21

Affected Versions Detail

Product
Affected Versions
Fixed Version
Craft CMS
Pixel & Tonic
< 4.16.174.16.17
Craft CMS
Pixel & Tonic
< 5.8.215.8.21
AttributeDetail
CWE IDCWE-915 (Mass Assignment)
Secondary CWECWE-639 (Insecure Direct Object Reference)
Attack VectorNetwork (HTTP POST)
CVSS v3.17.5 (High)
Exploit StatusFunctional PoC Available
Privileges RequiredLow (Authenticated User)
CWE-915
Improperly Controlled Modification of Dynamically-Determined Object Attributes

The application allows a client to supply multiple attributes in an input, but fails to verify that the attributes are valid for assignment, allowing attackers to modify sensitive data fields.

Vulnerability Timeline

Initial hardening commits pushed
2025-11-18
Patch released in v4.16.17 and v5.8.21
2025-12-03
CVE-2025-68436 assigned
2026-01-10

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.