CVE-2026-31858SQL Injection in Craft CMS

CWE-89SQL Injection5 documents5 sources
Severity
8.7HIGHNVD
EPSS
0.0%
top 89.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11

Description

Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in CVE-2026-25495. The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it. Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query p

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.9.9
NVDcraftcms/craft_cms5.0.15.9.9+1
CVEListV5craftcms/cms>= 5.0.0-RC1, <= 5.9.8

Patches

🔴Vulnerability Details

3
CVEList
CraftCMS's `ElementSearchController` Affected by Blind SQL Injection2026-03-11
GHSA
CraftCMS's `ElementSearchController` Affected by Blind SQL Injection2026-03-11
OSV
CraftCMS's `ElementSearchController` Affected by Blind SQL Injection2026-03-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-31858 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-31858 — SQL Injection in Craftcms Craft CMS | cvebase