CVE-2026-31857

Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*

History

17 Mar 2026, 14:15

Type Values Removed Values Added
References () https://github.com/craftcms/cms/commit/8d4903647dcfd31b8d40ed027e27082013347a80 - () https://github.com/craftcms/cms/commit/8d4903647dcfd31b8d40ed027e27082013347a80 - Patch
References () https://github.com/craftcms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc - () https://github.com/craftcms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Craftcms
Craftcms craft Cms
CPE cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta4:*:*:*:*:*:*
Summary
  • (es) Craft es un sistema de gestión de contenido (CMS). Antes de 5.9.9 y 4.17.4, existe una vulnerabilidad de ejecución remota de código en el sistema de condiciones de Craft CMS 5. El método BaseElementSelectConditionRule::getElementIds() pasa una entrada de cadena controlada por el usuario a través de renderObjectTemplate() -- una función de renderizado de Twig sin 'sandbox' con el escape deshabilitado. Cualquier usuario autenticado del Panel de Control (incluyendo roles no administrativos como Autor o Editor) puede lograr RCE completa enviando una regla de condición especialmente diseñada a través de los puntos finales estándar de listado de elementos. Esta vulnerabilidad no requiere privilegios de administrador, ni permisos especiales más allá del acceso básico al panel de control, y elude todas las configuraciones de endurecimiento de producción (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Los usuarios deben actualizar a la versión parcheada 5.9.9 o 4.17.4 para mitigar el problema.

11 Mar 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 18:16

Updated : 2026-03-17 14:15


NVD link : CVE-2026-31857

Mitre link : CVE-2026-31857

CVE.ORG link : CVE-2026-31857


JSON object : View

Products Affected

craftcms

  • craft_cms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')