CVE-2026-28784

EUVD-2026-9451
Craft is a content management system (CMS). Prior to 5.8.22 and 4.16.18, it is possible to craft a malicious payload using the Twig map filter in text fields that accept Twig input under Settings in the Craft control panel or using the System Messages utility, which could lead to a RCE. For this to work, you must have administrator access to the Craft Control Panel, and allowAdminChanges must be enabled for this to work, which is against our recommendations for any non-dev environment. Alternatively, you can have a non-administrator account with allowAdminChanges disabled, but you have access to the System Messages utility. Users should update to the patched versions (5.8.22 and 4.16.18) to mitigate the issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
craftcmscraft_cms
4.0.0 <
𝑥
< 4.17.0
craftcmscraft_cms
5.0.0 <
𝑥
< 5.9.0
craftcmscraft_cms
4.0.0
craftcmscraft_cms
4.0.0:rc1
craftcmscraft_cms
4.0.0:rc2
craftcmscraft_cms
4.0.0:rc3
craftcmscraft_cms
5.0.0
craftcmscraft_cms
5.0.0:rc1
𝑥
= Vulnerable software versions