CVE-2026-33159
Craft CMS: Unauthenticated users could execute project configuration sync operations that should be restricted trusted users
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, guest users can access Config Sync updater index, obtain signed data, and execute state-changing Config Sync actions (regenerate-yaml, apply-yaml-changes) without authentication. This issue has been patched in versions 4.17.8 and 5.9.14.
| CWE | CWE-306 CWE-862 |
| Vendor | craftcms |
| Product | cms |
| Published | Mar 24, 2026 |
| Last Updated | Mar 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for craftcms cms
Be the first to know when new unknown vulnerabilities affecting craftcms cms are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
craftcms / cms
>= 4.0.0-RC1, < 4.17.8 >= 5.0.0-RC1, < 5.9.14
References
github.com: https://github.com/craftcms/cms/security/advisories/GHSA-6mrr-q3pj-h53w github.com: https://github.com/craftcms/cms/commit/7f0ead833f7c2b91ae12003caad833479dd08592 github.com: https://github.com/craftcms/cms/releases/tag/4.17.8 github.com: https://github.com/craftcms/cms/releases/tag/5.9.14