CVE-2026-25493Server-Side Request Forgery in Craft CMS

Severity
6.9MEDIUMNVD
EPSS
0.0%
top 95.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9

Description

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows HTTP redirects by default. An attacker can bypass all SSRF protections by hosting a redirect that points to cloud metadata endpoints or any internal IP addresses. This issue is patched in versions 4.16.18 and 5.8.22.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.8.22+1
NVDcraftcms/craft_cms< 4.16.18+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.16.18, >= 5.0.0-RC1, < 5.8.22+1

Patches

🔴Vulnerability Details

3
OSV
Craft CMS Vulnerable to SSRF in GraphQL Asset Mutation via HTTP Redirect2026-02-09
CVEList
Craft has a SSRF in GraphQL Asset Mutation via HTTP Redirect2026-02-09
GHSA
Craft CMS Vulnerable to SSRF in GraphQL Asset Mutation via HTTP Redirect2026-02-09

🕵️Threat Intelligence

1
Wiz
CVE-2026-25493 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-25493 — Server-Side Request Forgery | cvebase