Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanseConfig() to assembleLayoutFromPost() and various FieldsController actions to strip Yii2 behavior/event injection keys ("as" and "on" prefixed keys). However, the fieldLayouts parameter in ElementIndexesController::actionFilterHud() is passed directly to FieldLayout::createFromConfig() without any sanitization, enabling the same behavior injection attack chain. This issue has been patched in version 5.9.13.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/97e90b4bdee369c1af3ca77a77531132df240e4e | Patch |
| https://github.com/craftcms/cms/releases/tag/5.9.13 | Release Notes |
| https://github.com/craftcms/cms/security/advisories/GHSA-2fph-6v5w-89hh | Exploit Vendor Advisory |
Configurations
History
26 Mar 2026, 17:08
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
Craftcms
Craftcms craft Cms |
|
| References | () https://github.com/craftcms/cms/commit/97e90b4bdee369c1af3ca77a77531132df240e4e - Patch | |
| References | () https://github.com/craftcms/cms/releases/tag/5.9.13 - Release Notes | |
| References | () https://github.com/craftcms/cms/security/advisories/GHSA-2fph-6v5w-89hh - Exploit, Vendor Advisory | |
| Summary |
|
24 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 18:16
Updated : 2026-03-26 17:08
NVD link : CVE-2026-33157
Mitre link : CVE-2026-33157
CVE.ORG link : CVE-2026-33157
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
