🔐 CVE Alert

CVE-2026-27127

UNKNOWN 0.0

Craft CMS has Cloud Metadata SSRF Protection Bypass via DNS Rebinding

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-Use (TOCTOU) vulnerability enables DNS rebinding attacks, where an attacker’s DNS server returns different IP addresses for validation compared to the actual request. This is a bypass of the security fix for CVE-2025-68437 that allows access to all blocked IPs, not just IPv6 endpoints. Exploitation requires GraphQL schema permissions for editing assets in the `<VolumeName>` volume and creating assets in the `<VolumeName>` volume. These permissions may be granted to authenticated users with appropriate GraphQL schema access and/or Public Schema (if misconfigured with write permissions). Versions 4.16.19 and 5.8.23 patch the issue.

CWE CWE-367
Vendor craftcms
Product cms
Published Feb 24, 2026
Last Updated Feb 28, 2026
Stay Ahead of the Next One

Get instant alerts for craftcms cms

Be the first to know when new unknown vulnerabilities affecting craftcms cms are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

craftcms / cms
>= 4.5.0-RC1, < 4.16.19 >= 5.0.0-RC1, < 5.8.23

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/craftcms/cms/security/advisories/GHSA-gp2f-7wcm-5fhx github.com: https://github.com/craftcms/cms/security/advisories/GHSA-x27p-wfqw-hfcc github.com: https://github.com/craftcms/cms/commit/a4cf3fb63bba3249cf1e2882b18a2d29e77a8575