Description
The Sprig Plugin for Craft CMS is a reactive Twig component framework for Craft CMS. Starting in version 2.0.0 and prior to versions 2.15.2 and 3.15.2, admin users, and users with explicit permission to access the Sprig Playground, could potentially expose the security key, credentials, and other sensitive configuration data, in addition to running the `hashData()` signing function. This issue was mitigated in versions 3.15.2 and 2.15.2 by disabling access to the Sprig Playground entirely when `devMode` is disabled, by default. It is possible to override this behavior using a new `enablePlaygroundWhenDevModeDisabled` that defaults to `false`.
Published: 2026-03-23
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

This vulnerability allows an attacker who can access the Sprig Playground to view sensitive configuration data, including the security key and credentials, and to use the hashData() signing function. The weakness is a disclosure of information that can be leveraged for credential compromise or forging signatures, meeting CWE‑200 and CWE‑489 criteria. The potential impact includes unauthorized access to protected resources, breaking of authentication flows, and possible escalation of privileges.

Affected Systems

The Sprig plugin for Craft CMS is affected. Versions from 2.0.0 up to 2.15.1 and from 3.0.0 up to 3.15.1 are vulnerable. The issue does not affect earlier releases or later patched versions such as 2.15.2, 3.15.2 and newer.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity, but the presence of useful default access for admin users means the exploitability is non‑negligible. No EPSS score is available, and the vulnerability is not listed in the KEV catalog. The likely attack vector is through a session with admin or authorised explorer access to the Sprig Playground; an attacker can read and exploit exposed keys or run the signing function to forge data.

Generated by OpenCVE AI on March 23, 2026 at 20:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Sprig plugin to version 2.15.2 or newer, or version 3.15.2 or newer.

Generated by OpenCVE AI on March 23, 2026 at 20:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m59h-42jf-cphr Sprig Plugin for Craft CMS potentially discloses sensitive information via Sprig Playground
History

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Putyourlightson
Putyourlightson craft-sprig
Vendors & Products Putyourlightson
Putyourlightson craft-sprig

Mon, 23 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description The Sprig Plugin for Craft CMS is a reactive Twig component framework for Craft CMS. Starting in version 2.0.0 and prior to versions 2.15.2 and 3.15.2, admin users, and users with explicit permission to access the Sprig Playground, could potentially expose the security key, credentials, and other sensitive configuration data, in addition to running the `hashData()` signing function. This issue was mitigated in versions 3.15.2 and 2.15.2 by disabling access to the Sprig Playground entirely when `devMode` is disabled, by default. It is possible to override this behavior using a new `enablePlaygroundWhenDevModeDisabled` that defaults to `false`.
Title Sprig Plugin for Craft CMS potentially discloses sensitive information via Sprig Playground
Weaknesses CWE-200
CWE-489
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Putyourlightson Craft-sprig
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T14:09:08.984Z

Reserved: 2026-02-17T18:42:27.044Z

Link: CVE-2026-27131

cve-icon Vulnrichment

Updated: 2026-03-24T14:09:01.527Z

cve-icon NVD

Status : Deferred

Published: 2026-03-23T20:16:25.240

Modified: 2026-04-15T15:45:46.430

Link: CVE-2026-27131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:36:58Z

Weaknesses