Description
Craft CMS is a content management system (CMS). From 4.0.0 to before 4.17.12 and 5.9.18, Craft CMS which contains an input-handling flaw in a Yii object creation path that let any authenticated user inject malicious configuration and execute arbitrary commands on the server. The request-controlled condition field layouts data is converted into a live FieldLayout object without a Component::cleanseConfig() boundary. Because Craft configures models before parent::__construct(), attacker-controlled special config keys can take effect during object creation, and FieldLayout initialization then triggers a same-request event. This vulnerability is fixed in 4.17.12 and 5.9.18.
Published: 2026-05-12
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Craft CMS versions 4.0.0 through 4.17.11 and all 5.x releases prior to 5.9.18 contain an input handling flaw in a Yii object creation path that allows an authenticated user to add malicious configuration data. The flaw occurs because configuration from user-controlled payloads is applied before the parent constructor is called, enabling attacker-controlled special keys to influence object instantiation. This can lead to arbitrary command execution on the server, constituting a high severity vulnerability.

Affected Systems

Affected systems are Craft CMS installations running any version from 4.0.0 up to and including 4.17.11, as well as all 5.x releases before 5.9.18. The flaw is present in the framework’s handling of FieldLayout objects processed during a same-request event.

Risk and Exploitability

The CVSS score of 8.6 indicates a high impact, while the EPSS score is not available, making it unclear how frequently exploits have been observed. The vulnerability is not listed in the CISA KEV catalog. Attack exploitation requires the attacker to be an authenticated user with permissions to upload or edit content that triggers the bad configuration path. Once accessed, the flaw can be leveraged to execute arbitrary commands on the host system.

Generated by OpenCVE AI on May 12, 2026 at 22:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Craft CMS to version 4.17.12 or newer, or 5.9.18 or newer to apply the vendor fix.
  • If an immediate upgrade is not possible, restrict or disable the upload of custom behaviors and remove any existing malicious attachments until the patch can be applied.
  • Limit user permissions to content editing or management functions until the service is patched or additional logging is implemented to detect suspicious configuration attempts.

Generated by OpenCVE AI on May 12, 2026 at 22:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qrgm-p9w5-rrfw Craft CMS has Potential Authenticated Remote Code Execution via Malicious Attached Behavior
History

Tue, 12 May 2026 21:00:00 +0000

Type Values Removed Values Added
Description Craft CMS is a content management system (CMS). From 4.0.0 to before 4.17.12 and 5.9.18, Craft CMS which contains an input-handling flaw in a Yii object creation path that let any authenticated user inject malicious configuration and execute arbitrary commands on the server. The request-controlled condition field layouts data is converted into a live FieldLayout object without a Component::cleanseConfig() boundary. Because Craft configures models before parent::__construct(), attacker-controlled special config keys can take effect during object creation, and FieldLayout initialization then triggers a same-request event. This vulnerability is fixed in 4.17.12 and 5.9.18.
Title Craft CMS: Potential authenticated Remote Code Execution via malicious attached Behavior
Weaknesses CWE-479
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T20:25:08.183Z

Reserved: 2026-05-04T21:24:36.505Z

Link: CVE-2026-44011

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T21:16:15.870

Modified: 2026-05-12T21:16:15.870

Link: CVE-2026-44011

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:45:15Z

Weaknesses