Home

Description

Craft CMS is a content management system (CMS). In versions on the 4.x branch through 4.17.8 and the 5.x branch through 5.9.14, the `resource-js` endpoint in Craft CMS allows unauthenticated requests to proxy remote JavaScript resources. When `trustedHosts` is not explicitly restricted (default configuration), the application trusts the client-supplied Host header. This allows an attacker to control the derived `baseUrl`, which is used in prefix validation inside `actionResourceJs()`. By supplying a malicious Host header, the attacker can make the server issue arbitrary HTTP requests, leading to Server-Side Request Forgery (SSRF). Versions 4.17.9 and 5.9.15 patch the issue.

PUBLISHED Reserved 2026-04-17 | Published 2026-04-21 | Updated 2026-04-22 | Assigner GitHub_M




MEDIUM: 5.5CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 5.0.0-RC1, < 5.9.15
affected

>= 4.0.0-RC1, < 4.17.9
affected

References

github.com/...ms/cms/security/advisories/GHSA-95wr-3f2v-v2wh exploit

github.com/...ms/cms/security/advisories/GHSA-95wr-3f2v-v2wh

github.com/...ommit/ebe7e85f1c89700d64332f72492be2e9a594e783

cve.org (CVE-2026-41130)

nvd.nist.gov (CVE-2026-41130)

Download JSON