CVE-2026-31857

HIGH WAF: Medium
CVSS 8.8 Published: 2026-03-11
CWE-94

Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.

WAF Coverage Analysis

Code Injection Medium WAF Coverage

OWASP: A03:2021 Injection

932xxx - Remote Code Execution 933xxx - PHP Injection 934xxx - Node.js / Generic Injection

Affected Software

VendorProductVersion
craftcmscraft_cms4.0.0.1 - 4.17.4
craftcmscraft_cms5.0.1 - 5.9.9
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0
craftcmscraft_cms4.0.0

References

Back to CVE Database