Description
Craft CMS is a content management system. In Craft versions 3.5.0 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the save_images_Asset GraphQL mutation can be abused to fetch internal URLs by providing a domain name that resolves to an internal IP address, bypassing hostname validation. When a non-image file extension such as .txt is allowed, downstream image validation is bypassed, which can allow an authenticated attacker with permission to use save_images_Asset to retrieve sensitive data such as AWS instance metadata credentials from the underlying host. This issue is patched in versions 4.16.18 and 5.8.22.
Published: 2026-02-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Exfiltration of AWS instance metadata credentials via Craft CMS GraphQL mutation
Action: Immediate Patch
AI Analysis

Impact

Craft CMS’ save_images_Asset GraphQL mutation can be abused to fetch internal URLs by providing a domain that resolves to an internal IP address, bypassing hostname validation. When a non‑image file extension such as .txt is allowed, downstream image validation is skipped, enabling an attacker with permission to the mutation to retrieve sensitive data like AWS instance metadata credentials from the underlying host. This flaw represents a Server‑Side Request Forgery weakness and can lead to credential leakage.

Affected Systems

Versions 3.5.0 through 4.16.17 and 5.0.0‑RC1 through 5.8.21 of Craft CMS are affected. The issue is fixed in 4.16.18 and 5.8.22 and later releases.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, while an EPSS score below 1% shows a very low exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an authenticated user with the ability to invoke the save_images_Asset mutation and supply a domain that resolves to an internal IP. Once executed, the attacker can exfiltrate AWS metadata credentials, representing a serious confidentiality breach if privileged accounts are targeted or compromised.

Generated by OpenCVE AI on April 18, 2026 at 12:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Craft CMS update (v4.16.18 or v5.8.22) to remove the vulnerable save_images_Asset mutation logic.
  • Review and restrict GraphQL `save_images_Asset` permissions, granting the mutation only to trusted accounts and revoking it from users who do not require image upload capability.
  • Block internal DNS resolution in the mutation or enforce hostname validation to prevent requests to internal IPs, and consider disabling support for non‑image file extensions submitted to the mutation.

Generated by OpenCVE AI on April 18, 2026 at 12:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-96pq-hxpw-rgh8 Craft CMS: save_images_Asset graphql mutation can be abused to exfiltrate AWS credentials of underlying host
History

Thu, 19 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms craft Cms
CPEs cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
Vendors & Products Craftcms craft Cms
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms
Craftcms craftcms
Vendors & Products Craftcms
Craftcms craftcms

Mon, 09 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description Craft CMS is a content management system. In Craft versions 3.5.0 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the save_images_Asset GraphQL mutation can be abused to fetch internal URLs by providing a domain name that resolves to an internal IP address, bypassing hostname validation. When a non-image file extension such as .txt is allowed, downstream image validation is bypassed, which can allow an authenticated attacker with permission to use save_images_Asset to retrieve sensitive data such as AWS instance metadata credentials from the underlying host. This issue is patched in versions 4.16.18 and 5.8.22.
Title Craft has a save_images_Asset graphql mutation can be abused to exfiltrate AWS credentials of underlying host
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Craftcms Craft Cms Craftcms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T16:00:41.366Z

Reserved: 2026-02-02T16:31:35.823Z

Link: CVE-2026-25492

cve-icon Vulnrichment

Updated: 2026-02-10T15:30:21.851Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T20:15:57.650

Modified: 2026-02-19T19:12:55.063

Link: CVE-2026-25492

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:00:08Z

Weaknesses