Home

Description

Craft is a content management system (CMS). Prior to 5.9.0-beta.2 and 4.17.0-beta.2, the actionSendActivationEmail() endpoint is accessible to unauthenticated users and does not require a permission check for pending users. An attacker with no prior access can trigger activation emails for any pending user account by knowing or guessing the user ID. If the attacker controls the target user’s email address, they can activate the account and gain access to the system. This vulnerability is fixed in 5.9.0-beta.2 and 4.17.0-beta.2.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-04 | Updated 2026-03-04 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

>= 5.0.0-RC1, < 5.9.0-beta.2
affected

>= 4.0.0-RC1, < 4.17.0-beta.2
affected

References

github.com/...ms/cms/security/advisories/GHSA-234q-vvw3-mrfq

github.com/...ommit/c3d02d4a7246f516933f42106c0a67ce062f68d8

cve.org (CVE-2026-29069)

nvd.nist.gov (CVE-2026-29069)

Download JSON