CVE-2018-19907
Description
A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Server-Side Template Injection in Crafter CMS 3.0.18 allows developers to execute OS commands via malicious FreeMarker templates.
Vulnerability
A Server-Side Template Injection (SSTI) vulnerability exists in Crafter CMS version 3.0.18. Attackers with developer privileges can inject malicious FreeMarker code into .ftl template files. The vulnerability is triggered when the template is rendered, calling freemarker.template.utility.Execute, leading to arbitrary OS command execution. [2][4]
Exploitation
An attacker must have developer-level access to create or modify a template file (.ftl extension). By injecting FreeMarker code that invokes the Execute utility, such as <#assign ex = "freemarker.template.utility.Execute"?new()>${ex("command")}, the attacker can execute arbitrary OS commands when the page is rendered. The exploit requires no additional user interaction beyond viewing the affected page. [4]
Impact
Successful exploitation allows an attacker to execute arbitrary OS commands on the server, potentially leading to full system compromise, data exfiltration, or lateral movement within the network. The attack is executed in the context of the Crafter CMS application user, typically with high privileges. [2][3]
Mitigation
As of the available references, no official patch has been released for CVE-2018-19907. Users are advised to restrict developer privileges to trusted individuals, monitor template file modifications, and consider applying principle of least privilege. Upgrading to a later version of Crafter CMS may include a fix, but no specific version is mentioned in the provided references. [3]
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.craftercms:crafter-studioMaven | <= 3.0.18 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-9fcp-vcq9-9h2hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-19907ghsaADVISORY
- github.com/craftercms/craftercms/issues/2677ghsax_refsource_MISCWEB
- medium.com/%40buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242mitrex_refsource_MISC
- medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242ghsaWEB
News mentions
0No linked articles in our index yet.