Home

Description

Craft CMS is a content management system (CMS). From 4.0.0 to before 4.17.12 and 5.9.18, Craft CMS which contains an input-handling flaw in a Yii object creation path that let any authenticated user inject malicious configuration and execute arbitrary commands on the server. The request-controlled condition field layouts data is converted into a live FieldLayout object without a Component::cleanseConfig() boundary. Because Craft configures models before parent::__construct(), attacker-controlled special config keys can take effect during object creation, and FieldLayout initialization then triggers a same-request event. This vulnerability is fixed in 4.17.12 and 5.9.18.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-12 | Updated 2026-05-13 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-479: Signal Handler Use of a Non-reentrant Function

Product status

>= 4.0.0, < 4.17.12
affected

>= 5.0.0, < 5.9.18
affected

References

github.com/...ms/cms/security/advisories/GHSA-qrgm-p9w5-rrfw exploit

github.com/...ms/cms/security/advisories/GHSA-qrgm-p9w5-rrfw

github.com/...ommit/ab85ca7f5f926994f723f60584054a1f4c4c5de3

cve.org (CVE-2026-44011)

nvd.nist.gov (CVE-2026-44011)

Download JSON