CVE-2026-32262Path Traversal in Craft CMS

CWE-22Path Traversal5 documents5 sources
Severity
5.3MEDIUMNVD
EPSS
0.0%
top 90.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 16

Description

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a targetFilename body parameter that is used unsanitized in a deleteFile() call before Assets::prepareAssetName() is applied on save. This allows an authenticated user with replaceFiles permission to delete arbitrary files within the same filesystem root by injecting ../ path traversal sequences into th

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms4.0.0-RC14.17.5+1
NVDcraftcms/craft_cms4.0.0.14.17.5+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.17.5, >= 5.0.0-RC1, < 5.9.11+1

Patches

🔴Vulnerability Details

3
OSV
Craft CMS has a Path Traversal Vulnerability in AssetsController2026-03-16
GHSA
Craft CMS has a Path Traversal Vulnerability in AssetsController2026-03-16
CVEList
Craft CMS has a Path Traversal Vulnerability in AssetsController2026-03-16

🕵️Threat Intelligence

1
Wiz
CVE-2026-32262 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-32262 — Path Traversal in Craftcms Craft CMS | cvebase