Home

Description

Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in CVE-2026-25495. The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it. Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query properties, and extract the full database contents via boolean-based blind injection. Users should update to the patched 5.9.9 release to mitigate the issue.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-11 | Updated 2026-03-12 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

>= 5.0.0-RC1, <= 5.9.8
affected

References

github.com/...ms/cms/security/advisories/GHSA-g7j6-fmwx-7vp8

github.com/...ommit/e1a3dd669ae31491b86ad996e88a1d30d33d9a42

cve.org (CVE-2026-31858)

nvd.nist.gov (CVE-2026-31858)

Download JSON