CVE-2026-25494Server-Side Request Forgery in Craft CMS

Severity
6.9MEDIUMNVD
EPSS
0.0%
top 95.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9

Description

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation uses filter_var(..., FILTER_VALIDATE_IP) to block a specific list of IP addresses. However, alternative IP notations (hexadecimal, mixed) are not recognized by this function, allowing attackers to bypass the blocklist and access cloud metadata services. This issue is patched in versions 4.16.18 and 5.8.22.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.8.22+1
NVDcraftcms/craft_cms< 4.16.18+3
CVEListV5craftcms/cms>= 5.0.0-RC1, < 5.8.22

Patches

🔴Vulnerability Details

3
GHSA
Craft CMS Vulnerable to SSRF in GraphQL Asset Mutation via Alternative IP Notation2026-02-09
CVEList
Craft has a SSRF in GraphQL Asset Mutation via Alternative IP Notation2026-02-09
OSV
Craft CMS Vulnerable to SSRF in GraphQL Asset Mutation via Alternative IP Notation2026-02-09

🕵️Threat Intelligence

1
Wiz
CVE-2026-25494 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-25494 — Server-Side Request Forgery | cvebase