Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled.
Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 12
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
|
4.0.0.1
|
4.17.4
|
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
|
5.0.1
|
5.9.9
|
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta1:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta2:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta3:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:beta4:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*
|
— | — |
|
Craftcms Craft_Cms
cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*
|
— | — |