Craftcms

Craft Cms

98 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.02.2026 19:42:57
  • Zuletzt bearbeitet 19.02.2026 19:18:14

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the element-indexes/get-elements endpoint is vulnerable to SQL Injection via the criteria[orderBy] parameter (JSON body). ...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.02.2026 19:41:13
  • Zuletzt bearbeitet 19.02.2026 19:17:44

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation uses filter_var(..., FILTER_VALIDATE_IP) to block a specific list of IP addresses. However...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.02.2026 19:36:58
  • Zuletzt bearbeitet 19.02.2026 19:20:06

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.02.2026 19:33:24
  • Zuletzt bearbeitet 19.02.2026 19:12:55

Craft CMS is a content management system. In Craft versions 3.5.0 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the save_images_Asset GraphQL mutation can be abused to fetch internal URLs by providing a domain name that resolves to an internal IP add...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.02.2026 19:25:29
  • Zuletzt bearbeitet 19.02.2026 19:26:43

Craft is a platform for creating digital experiences. From 5.0.0-RC1 to 5.8.21, Craft has a stored XSS via Entry Type names. The name is not sanitized when displayed in the Entry Types list. This vulnerability is fixed in 5.8.22.

  • EPSS 0.55%
  • Veröffentlicht 03.02.2026 22:16:22
  • Zuletzt bearbeitet 15.04.2026 00:35:42

CraftCMS 3 vCard Plugin 1.0.0 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through a crafted payload. Attackers can generate a malicious serialized payload that triggers remote code exec...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 05.01.2026 22:15:52
  • Zuletzt bearbeitet 12.01.2026 18:19:38

Craft is a platform for creating digital experiences. In versions 5.0.0-RC1 through 5.8.20 and 3.0.0 through 4.16.16, unauthenticated users can trigger database backup operations via specific admin actions, potentially leading to resource exhaustion...

Exploit
  • EPSS 1.18%
  • Veröffentlicht 05.01.2026 21:59:00
  • Zuletzt bearbeitet 12.01.2026 18:21:12

Craft is a platform for creating digital experiences. Versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16 are vulnerable to potential authenticated Remote Code Execution via malicious attached Behavior. Note that attackers must have admin...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 05.01.2026 21:56:00
  • Zuletzt bearbeitet 12.01.2026 18:23:45

Craft is a platform for creating digital experiences. Versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16 are vulnerable to potential authenticated Remote Code Execution via Twig SSTI. For this to work, users must have administrator acces...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 05.01.2026 21:52:29
  • Zuletzt bearbeitet 12.01.2026 18:28:14

Craft is a platform for creating digital experiences. In versions 5.0.0-RC1 through 5.8.20 and 4.0.0-RC1 through 4.16.16, the Craft CMS GraphQL `save_<VolumeName>_Asset` mutation is vulnerable to Server-Side Request Forgery (SSRF). This vulnerability...