Home

Description

Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-11 | Updated 2026-03-12 | Assigner GitHub_M




HIGH: 8.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

>= 5.0.0-RC1, < 5.9.9
affected

>= 4.0.0-beta.1, < 4.17.4
affected

References

github.com/...ms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc

github.com/...ommit/8d4903647dcfd31b8d40ed027e27082013347a80

cve.org (CVE-2026-31857)

nvd.nist.gov (CVE-2026-31857)

Download JSON