Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qrgm-p9w5-rrfw | Craft CMS has Potential Authenticated Remote Code Execution via Malicious Attached Behavior |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftcms
Craftcms craftcms |
|
| Vendors & Products |
Craftcms
Craftcms craftcms |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Craft CMS is a content management system (CMS). From 4.0.0 to before 4.17.12 and 5.9.18, Craft CMS which contains an input-handling flaw in a Yii object creation path that let any authenticated user inject malicious configuration and execute arbitrary commands on the server. The request-controlled condition field layouts data is converted into a live FieldLayout object without a Component::cleanseConfig() boundary. Because Craft configures models before parent::__construct(), attacker-controlled special config keys can take effect during object creation, and FieldLayout initialization then triggers a same-request event. This vulnerability is fixed in 4.17.12 and 5.9.18. | |
| Title | Craft CMS: Potential authenticated Remote Code Execution via malicious attached Behavior | |
| Weaknesses | CWE-479 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T15:37:25.178Z
Reserved: 2026-05-04T21:24:36.505Z
Link: CVE-2026-44011
Updated: 2026-05-13T15:01:52.312Z
Status : Deferred
Published: 2026-05-12T21:16:15.870
Modified: 2026-05-13T16:16:53.997
Link: CVE-2026-44011
No data.
OpenCVE Enrichment
Updated: 2026-05-13T09:45:09Z
Github GHSA