๐Ÿ” CVE Alert

CVE-2026-33157

UNKNOWN 0.0

Craft CMS: Potential authenticated Remote Code Execution via malicious attached Behavior

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanseConfig() to assembleLayoutFromPost() and various FieldsController actions to strip Yii2 behavior/event injection keys ("as" and "on" prefixed keys). However, the fieldLayouts parameter in ElementIndexesController::actionFilterHud() is passed directly to FieldLayout::createFromConfig() without any sanitization, enabling the same behavior injection attack chain. This issue has been patched in version 5.9.13.

CWE CWE-470
Vendor craftcms
Product cms
Published Mar 24, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for craftcms cms

Be the first to know when new unknown vulnerabilities affecting craftcms cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

craftcms / cms
>= 5.6.0, < 5.9.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/craftcms/cms/security/advisories/GHSA-2fph-6v5w-89hh github.com: https://github.com/craftcms/cms/commit/97e90b4bdee369c1af3ca77a77531132df240e4e github.com: https://github.com/craftcms/cms/releases/tag/5.9.13