Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows HTTP redirects by default. An attacker can bypass all SSRF protections by hosting a redirect that points to cloud metadata endpoints or any internal IP addresses. This issue is patched in versions 4.16.18 and 5.8.22.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/0974055634af68998f67850ab2045d8aaa19fa98 | Patch |
| https://github.com/craftcms/cms/releases/tag/5.8.22 | Release Notes |
| https://github.com/craftcms/cms/security/advisories/GHSA-8jr8-7hr4-vhfx | Exploit Vendor Advisory Patch |
Configurations
Configuration 1 (hide)
|
History
19 Feb 2026, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:* |
|
| First Time |
Craftcms
Craftcms craft Cms |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| Summary |
|
|
| References | () https://github.com/craftcms/cms/commit/0974055634af68998f67850ab2045d8aaa19fa98 - Patch | |
| References | () https://github.com/craftcms/cms/releases/tag/5.8.22 - Release Notes | |
| References | () https://github.com/craftcms/cms/security/advisories/GHSA-8jr8-7hr4-vhfx - Exploit, Vendor Advisory, Patch |
09 Feb 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 20:15
Updated : 2026-02-19 19:20
NVD link : CVE-2026-25493
Mitre link : CVE-2026-25493
CVE.ORG link : CVE-2026-25493
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-918
Server-Side Request Forgery (SSRF)
