| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2453-mppf-46cj | Craft CMS Vulnerable to SQL Injection in Element Indexes via `criteria[orderBy]` |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftcms
Craftcms craftcms |
|
| Vendors & Products |
Craftcms
Craftcms craftcms |
Mon, 09 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the element-indexes/get-elements endpoint is vulnerable to SQL Injection via the criteria[orderBy] parameter (JSON body). The application fails to sanitize this input before using it in the database query. An attacker with Control Panel access can inject arbitrary SQL into the ORDER BY clause by omitting viewState[order] (or setting both to the same payload). This issue is patched in versions 4.16.18 and 5.8.22. | |
| Title | Craft has a SQL Injection in Element Indexes via criteria[orderBy] | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T16:00:20.118Z
Reserved: 2026-02-02T16:31:35.824Z
Link: CVE-2026-25495
Updated: 2026-02-10T15:32:11.039Z
Status : Undergoing Analysis
Published: 2026-02-09T20:15:58.080
Modified: 2026-02-09T21:55:30.093
Link: CVE-2026-25495
No data.
OpenCVE Enrichment
Updated: 2026-02-10T15:37:28Z
Github GHSA