Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in CVE-2026-25495. The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it. Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query properties, and extract the full database contents via boolean-based blind injection. Users should update to the patched 5.9.9 release to mitigate the issue.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/e1a3dd669ae31491b86ad996e88a1d30d33d9a42 | Patch |
| https://github.com/craftcms/cms/security/advisories/GHSA-g7j6-fmwx-7vp8 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Mar 2026, 14:05
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Craftcms
Craftcms craft Cms |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:* |
|
| References | () https://github.com/craftcms/cms/commit/e1a3dd669ae31491b86ad996e88a1d30d33d9a42 - Patch | |
| References | () https://github.com/craftcms/cms/security/advisories/GHSA-g7j6-fmwx-7vp8 - Patch, Vendor Advisory |
11 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 18:16
Updated : 2026-03-17 14:05
NVD link : CVE-2026-31858
Mitre link : CVE-2026-31858
CVE.ORG link : CVE-2026-31858
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
