Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/8d4903647dcfd31b8d40ed027e27082013347a80 | Patch |
| https://github.com/craftcms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-11 18:16
Updated : 2026-03-17 14:15
NVD link : CVE-2026-31857
Mitre link : CVE-2026-31857
CVE.ORG link : CVE-2026-31857
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
