๐Ÿ” CVE Alert

CVE-2026-31857

UNKNOWN 0.0

CraftCMS has an RCE vulnerability via relational conditionals in the control panel

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.

CWE CWE-94
Vendor craftcms
Product cms
Published Mar 11, 2026
Last Updated Mar 12, 2026
Stay Ahead of the Next One

Get instant alerts for craftcms cms

Be the first to know when new unknown vulnerabilities affecting craftcms cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

craftcms / cms
>= 5.0.0-RC1, < 5.9.9 >= 4.0.0-beta.1, < 4.17.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/craftcms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc github.com: https://github.com/craftcms/cms/commit/8d4903647dcfd31b8d40ed027e27082013347a80