CVE-2026-33160Authorization Bypass Through User-Controlled Key in Craft CMS

Severity
2.7LOWNVD
EPSS
0.0%
top 87.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, an unauthenticated user can call assets/generate-transform with a private assetId, receive a valid transform URL, and fetch transformed image bytes. The endpoint is anonymous and does not enforce per-asset authorization before returning the transform URL. This issue has been patched in versions 4.17.8 and 5.9.14.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.9.14+1
NVDcraftcms/craft_cms< 4.17.8+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.17.8, >= 5.0.0-RC1, < 5.9.14+1

Patches

🔴Vulnerability Details

3
GHSA
Craft CMS may expose private assets through anonymous "generate transform" calls via transform URL2026-03-24
CVEList
Craft CMS: Anonymous "generate transform" calls for assets can expose private assets via transform URL2026-03-24
OSV
Craft CMS may expose private assets through anonymous "generate transform" calls via transform URL2026-03-24

🕵️Threat Intelligence

1
Wiz
CVE-2026-33160 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33160 — Craftcms Craft CMS vulnerability | cvebase