CVE-2026-31857Code Injection in Craft CMS

CWE-94Code Injection5 documents5 sources
Severity
8.1HIGHNVD
EPSS
0.1%
top 69.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11

Description

Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via sta

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.9.9+1
NVDcraftcms/craft_cms4.0.0.14.17.4+3
CVEListV5craftcms/cms>= 4.0.0-beta.1, < 4.17.4, >= 5.0.0-RC1, < 5.9.9+1

Patches

🔴Vulnerability Details

3
CVEList
CraftCMS has an RCE vulnerability via relational conditionals in the control panel2026-03-11
GHSA
CraftCMS has an RCE vulnerability via relational conditionals in the control panel2026-03-11
OSV
CraftCMS has an RCE vulnerability via relational conditionals in the control panel2026-03-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-31857 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-31857 — Code Injection in Craftcms Craft CMS | cvebase