CVE-2026-33159Missing Authentication for Critical Function in Craft CMS

Severity
6.9MEDIUMNVD
EPSS
0.1%
top 75.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, guest users can access Config Sync updater index, obtain signed data, and execute state-changing Config Sync actions (regenerate-yaml, apply-yaml-changes) without authentication. This issue has been patched in versions 4.17.8 and 5.9.14.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.9.14+1
NVDcraftcms/craft_cms< 4.17.8+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.17.8, >= 5.0.0-RC1, < 5.9.14+1

Patches

🔴Vulnerability Details

3
CVEList
Craft CMS: Unauthenticated users could execute project configuration sync operations that should be restricted trusted users2026-03-24
OSV
Craft CMS: Unauthenticated Users Can Perform Restricted Project Config Sync Operations2026-03-24
GHSA
Craft CMS: Unauthenticated Users Can Perform Restricted Project Config Sync Operations2026-03-24

🕵️Threat Intelligence

1
Wiz
CVE-2026-33159 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33159 — Craftcms Craft CMS vulnerability | cvebase