Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fp5j-j7j4-mcxc | CraftCMS has an RCE vulnerability via relational conditionals in the control panel |
Tue, 17 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftcms craft Cms
|
|
| CPEs | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Craftcms craft Cms
|
|
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftcms
Craftcms craftcms |
|
| Vendors & Products |
Craftcms
Craftcms craftcms |
Wed, 11 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue. | |
| Title | CraftCMS has an RCE vulnerability via relational conditionals in the control panel | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T14:02:26.953Z
Reserved: 2026-03-09T19:02:25.011Z
Link: CVE-2026-31857
Updated: 2026-03-12T14:02:22.690Z
Status : Analyzed
Published: 2026-03-11T18:16:24.360
Modified: 2026-03-17T14:15:46.283
Link: CVE-2026-31857
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:30:14Z
Github GHSA