Home

Description

Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-beta.1, Craft CMS implements a blocklist to prevent potentially dangerous PHP functions from being called via Twig non-Closure arrow functions. In order to be able to successfully execute this attack, you need to either have allowAdminChanges enabled on production, or a compromised admin account, or an account with access to the System Messages utility. Several PHP functions are not included in the blocklist, which could allow malicious actors with the required permissions to execute various types of payloads, including RCEs, arbitrary file reads, SSRFs, and SSTIs. This vulnerability is fixed in 5.9.0-beta.1 and 4.17.0-beta.1.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-04 | Updated 2026-03-06 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-184: Incomplete List of Disallowed Inputs

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Product status

>= 5.0.0-RC1, <= 5.9.0-beta.1
affected

>= 4.0.0-RC1, <= 4.17.0-beta.1
affected

References

github.com/...ms/cms/security/advisories/GHSA-5fvc-7894-ghp4

github.com/craftcms/cms/pull/18208

cve.org (CVE-2026-28783)

nvd.nist.gov (CVE-2026-28783)

Download JSON