🔐 CVE Alert

CVE-2026-27128

UNKNOWN 0.0

Craft CMS's race condition in Token Service potentially allows for token usage greater than the token limit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, a Time-of-Check-Time-of-Use (TOCTOU) race condition exists in Craft CMS’s token validation service for tokens that explicitly set a limited usage. The `getTokenRoute()` method reads a token’s usage count, checks if it’s within limits, then updates the database in separate non-atomic operations. By sending concurrent requests, an attacker can use a single-use impersonation token multiple times before the database update completes. To make this work, an attacker needs to obtain a valid user account impersonation URL with a non-expired token via some other means and exploit a race condition while bypassing any rate-limiting rules in place. For this to be a privilege escalation, the impersonation URL must include a token for a user account with more permissions than the current user. Versions 4.16.19 and 5.8.23 patch the issue.

CWE CWE-367
Vendor craftcms
Product cms
Published Feb 24, 2026
Last Updated Feb 28, 2026
Stay Ahead of the Next One

Get instant alerts for craftcms cms

Be the first to know when new unknown vulnerabilities affecting craftcms cms are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

craftcms / cms
>= 4.5.0-RC1, < 4.16.19 >= 5.0.0-RC1, < 5.8.23

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/craftcms/cms/security/advisories/GHSA-6fx5-5cw5-4897 github.com: https://github.com/craftcms/cms/commit/3e4afe18279951c024c64896aa2b93cda6d95fdf