Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows HTTP redirects by default. An attacker can bypass all SSRF protections by hosting a redirect that points to cloud metadata endpoints or any internal IP addresses. This issue is patched in versions 4.16.18 and 5.8.22.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/0974055634af68998f67850ab2045d8aaa19fa98 | Patch |
| https://github.com/craftcms/cms/releases/tag/5.8.22 | Release Notes |
| https://github.com/craftcms/cms/security/advisories/GHSA-8jr8-7hr4-vhfx | Exploit Vendor Advisory Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-09 20:15
Updated : 2026-02-19 19:20
NVD link : CVE-2026-25493
Mitre link : CVE-2026-25493
CVE.ORG link : CVE-2026-25493
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-918
Server-Side Request Forgery (SSRF)
