CVE-2026-28697Improper Neutralization of Special Elements Used in a Template Engine in Craft CMS

Severity
9.4CRITICALNVD
EPSS
0.2%
top 57.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4

Description

Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g., Email Templates). By calling the craft.app.fs.write() method, an attacker can write a malicious PHP script to a web-accessible directory and subsequently access it via the browser to execute arbitrary system commands. This vulnerability is fixed in 4

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.9.0-beta.1+1
NVDcraftcms/craft_cms< 4.17.0+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.17.0-beta.1, >= 5.0.0-RC1, < 5.9.0-beta.1+1

Patches

🔴Vulnerability Details

3
CVEList
Craft Affected by Authenticated RCE via "craft.app.fs.write()" in Twig Templates2026-03-04
GHSA
Craft CMS Vulnerable to Authenticated RCE via "craft.app.fs.write()" in Twig Templates2026-03-03
OSV
Craft CMS Vulnerable to Authenticated RCE via "craft.app.fs.write()" in Twig Templates2026-03-03

🕵️Threat Intelligence

1
Wiz
CVE-2026-28697 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-28697 — Craftcms Craft CMS vulnerability | cvebase