Craft is a platform for creating digital experiences. In Craft versions from 4.0.0-RC1 to before 4.17.0-beta.1 and 5.9.0-beta.1, there is a Privilege Escalation vulnerability in Craft CMS’s GraphQL API that allows an authenticated user with write access to one asset volume to escalate their privileges and modify/transfer assets belonging to any other volume, including restricted or private volumes to which they should not have access. The saveAsset GraphQL mutation validates authorization against the schema-resolved volume but fetches the target asset by ID without verifying that the asset belongs to the authorized volume. This allows unauthorized cross-volume asset modification and transfer. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/ac7edf868c1a81fd9c4dc49d3b3edf1cce113409 | Patch |
| https://github.com/craftcms/cms/releases/tag/5.8.22 | Release Notes |
| https://github.com/craftcms/cms/security/advisories/GHSA-fxp3-g6gw-4r4v | Vendor Advisory Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-09 20:15
Updated : 2026-02-19 19:16
NVD link : CVE-2026-25497
Mitre link : CVE-2026-25497
CVE.ORG link : CVE-2026-25497
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
