Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation uses `gethostbyname()`, which only resolves IPv4 addresses. When a hostname has only AAAA (IPv6) records, the function returns the hostname string itself, causing the blocklist comparison to always fail and completely bypassing SSRF protection. This is a bypass of the security fix for CVE-2025-68437. Exploitation requires GraphQL schema permissions for editing assets in the `<VolumeName>` volume and creating assets in the `<VolumeName>` volume. These permissions may be granted to authenticated users with appropriate GraphQL schema access and/or Public Schema (if misconfigured with write permissions). Versions 4.16.19 and 5.8.23 patch the issue.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/2825388b4f32fb1c9bd709027a1a1fd192d709a3 | Patch |
| https://github.com/craftcms/cms/security/advisories/GHSA-v2gc-rm6g-wrw9 | Exploit Mitigation Patch Vendor Advisory |
| https://github.com/craftcms/cms/security/advisories/GHSA-x27p-wfqw-hfcc | Not Applicable |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-24 03:16
Updated : 2026-03-02 20:35
NVD link : CVE-2026-27129
Mitre link : CVE-2026-27129
CVE.ORG link : CVE-2026-27129
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-918
Server-Side Request Forgery (SSRF)
