Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanseConfig() to assembleLayoutFromPost() and various FieldsController actions to strip Yii2 behavior/event injection keys ("as" and "on" prefixed keys). However, the fieldLayouts parameter in ElementIndexesController::actionFilterHud() is passed directly to FieldLayout::createFromConfig() without any sanitization, enabling the same behavior injection attack chain. This issue has been patched in version 5.9.13.
References
| Link | Resource |
|---|---|
| https://github.com/craftcms/cms/commit/97e90b4bdee369c1af3ca77a77531132df240e4e | Patch |
| https://github.com/craftcms/cms/releases/tag/5.9.13 | Release Notes |
| https://github.com/craftcms/cms/security/advisories/GHSA-2fph-6v5w-89hh | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 18:16
Updated : 2026-03-26 17:08
NVD link : CVE-2026-33157
Mitre link : CVE-2026-33157
CVE.ORG link : CVE-2026-33157
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
