Craft Cms Craftcms Craft Cms

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Craftcms Craft Cms.

By the Year

In 2026 there have been 1 vulnerability in Craftcms Craft Cms with an average score of 9.8 out of ten. Last year, in 2025 Craft Cms had 3 security vulnerabilities published. At the current rates, it appears that the number of vulnerabilities last year and this year may equal out. However, the average CVE base score of the vulnerabilities in 2026 is greater by 2.00.




Year Vulnerabilities Average Score
2026 1 9.80
2025 3 7.80
2024 10 7.19
2023 14 6.50
2022 8 6.18
2021 5 7.70
2020 1 0.00
2019 5 9.80
2018 3 8.80

It may take a day or so for new Craft Cms vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Craftcms Craft Cms Security Vulnerabilities

CraftCMS 3 vCard Plugin 1.0.0: Unauthenticated PHP Deserialization RCE
CVE-2020-37071 9.8 - Critical - February 03, 2026

CraftCMS 3 vCard Plugin 1.0.0 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through a crafted payload. Attackers can generate a malicious serialized payload that triggers remote code execution by exploiting the plugin's vCard download functionality with a specially crafted request.

Marshaling, Unmarshaling

Craft CMS 5.7.5/4.15.3: Unauth Stored Arbitrary Content in Session Files (PHP)
CVE-2025-35939 5.3 - Medium - May 07, 2025

Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.

Assumed-Immutable Parameter Tampering

Craft CMS RCE 3-5.x Before 3.9.15/4.14.15/5.6.17
CVE-2025-32432 10 - Critical - April 25, 2025

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.

Code Injection

RCE in Craft CMS prior to 5.5.8/4.13.8 when security key compromised
CVE-2025-23209 8.1 - High - January 18, 2025

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.

Code Injection

Craft CMS Remote Code Execution Vulnerability via PHP register_argc_argv
CVE-2024-56145 - December 18, 2024

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.

Code Injection

LFS Bypass & SSTI RCE in CraftCMS <5.4.6/4.12.5 via double file://
CVE-2024-52291 7.2 - High - November 13, 2024

Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.

Directory traversal

Exploitable File Exfiltration via dataUrl in Craft CMS before 5.4.9
CVE-2024-52292 6.5 - Medium - November 13, 2024

Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.

Directory traversal

Craft CMS Remote Code Execution via Twig SSTI in FileHelper::absolutePath
CVE-2024-52293 7.2 - High - November 13, 2024

Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.

Directory traversal

Craft CMS 5 Stored XSS via Breadcrumb & Title Fields
CVE-2024-45406 4.8 - Medium - September 09, 2024

Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.

XSS

Craft CMS 5 TOTP Token Replay Allows Reauth Before 5.2.3
CVE-2024-41800 7.5 - High - July 25, 2024

Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3.

authentification

Craft CMS v3.x SQLi via GraphQL API before 3.7.31
CVE-2024-37843 9.8 - Critical - June 25, 2024

Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.

SQL Injection

Craft CMS Audit Plugin XSS before v3.0.2
CVE-2023-36259 5.4 - Medium - January 30, 2024

Cross Site Scripting (XSS) vulnerability in Craft CMS Audit Plugin before version 3.0.2 allows attackers to execute arbitrary code during user creation.

XSS

DoS via crafted FeedMe strings in v4.6.1 (Asset vol absent)
CVE-2023-36260 7.5 - High - January 30, 2024

An issue was discovered in the Feed Me plugin 4.6.1 for Craft CMS. It allows remote attackers to cause a denial of service (DoS) via crafted strings to Feed-Me Name and Feed-Me URL fields, due to saving a feed using an Asset element type with no volume selected. NOTE: this is not a report about code provided by the Craft CMS product; it is only a report about the Feed Me plugin. NOTE: a third-party report states that commit b5d6ede51848349bd91bc95fec288b6793f15e28 has "nothing to do with security."

Injection

CVE-2024-21622: Craft CMS privilege escalation before 3.9.6/4.4.16
CVE-2024-21622 8.8 - High - January 03, 2024

Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.

Craft CMS CVE-2023-41892 Before 4.4.15 High-Impact Vulnerability
CVE-2023-41892 9.8 - Critical - September 13, 2023

Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.

Code Injection

Remote Code Execution in Craft CMS 4.4 & 3.8 via Path Validation Bypass
CVE-2023-40035 7.2 - High - August 23, 2023

Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.

Injection

Craft CMS 4.4.9 HTML Injection Vulnerability
CVE-2023-33495 6.1 - Medium - June 20, 2023

Craft CMS through 4.4.9 is vulnerable to HTML Injection.

XSS

CraftCMS 3.7.59 SSTI via User Photo Location Field (RCE)
CVE-2023-30179 7.2 - High - June 13, 2023

CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default.

Code Injection

Craft CMS XSS via malformed RSS feed, fixed in 4.4.6
CVE-2023-33195 6.1 - Medium - May 27, 2023

Craft is a CMS for creating custom digital experiences on the web. A malformed RSS feed can deliver an XSS payload. This issue was patched in version 4.4.6.

XSS

Craft CMS 4.4.6 XSS in Quick Post error message (v4.4.6 patched)
CVE-2023-33194 4.8 - Medium - May 26, 2023

Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didnt fix it when clicking save. This issue was patched in version 4.4.6.

XSS

Craft CMS XSS via review volume before 4.4.7
CVE-2023-33196 5.4 - Medium - May 26, 2023

Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.

XSS

Craft CMS <4.4.6 XSS via Update Asset Index Utility
CVE-2023-33197 5.4 - Medium - May 26, 2023

Craft is a CMS for creating custom digital experiences on the web. Cross-site scripting (XSS) can be triggered via the Update Asset Index utility. This issue has been patched in version 4.4.6.

XSS

Stored XSS via field names in Craft CMS <=4.4.11
CVE-2023-2817 5.4 - Medium - May 26, 2023

A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively.

XSS

Craft CMS 4.x RCE via Unrestricted File Extension in View.php (before 4.4.6)
CVE-2023-32679 7.2 - High - May 19, 2023

Craft CMS is an open source content management system. In affected versions of Craft CMS an unrestricted file extension may lead to Remote Code Execution. If the name parameter value is not empty string('') in the View.php's doesTemplateExist() -> resolveTemplate() -> _resolveTemplateInternal() -> _resolveTemplate() function, it returns directly without extension verification, so that arbitrary extension files are rendered as twig templates. When attacker with admin privileges on a DEV or an improperly configured STG or PROD environment, they can exploit this vulnerability to remote code execution. Code execution may grant the attacker access to the host operating system. This issue has been addressed in version 4.4.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Injection

RCE in CraftCMS v3.8.1 via crafted Section param script
CVE-2023-30130 8.8 - High - May 12, 2023

An issue found in CraftCMS v.3.8.1 allows a remote attacker to execute arbitrary code via a crafted script to the Section parameter.

Code Injection

Craft CMS XSS via malformed title in Feed Widget (v3.0.0-3.8.3, 4.0-4.4.3)
CVE-2023-31144 6.1 - Medium - May 09, 2023

Craft CMS is a content management system. Starting in version 3.0.0 and prior to versions 3.8.4 and 4.4.4, a malformed title in the feed widget can deliver a cross-site scripting payload. This issue is fixed in version 3.8.4 and 4.4.4.

XSS

CraftCMS 3.7.59 XSS in Volume Name (PHP CMS, Pixel & Tonic)
CVE-2023-30177 6.1 - Medium - April 25, 2023

CraftCMS 3.7.59 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.

XSS

XSS via label/instruction in Craft CMS admin quick post widget pre-4.3.7
CVE-2023-23927 5.4 - Medium - March 03, 2023

Craft is a platform for creating digital experiences. When you insert a payload inside a label name or instruction of an entry type, an cross-site scripting (XSS) happens in the quick post widget on the admin dashboard. This issue has been fixed in version 4.3.7.

XSS

Craft CMS 3.0.0-3.7.32 Password Hash Disclosure via CRAFT_CSRF_TOKEN
CVE-2022-37783 7.5 - High - December 05, 2022

All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.

Insufficiently Protected Credentials

Craft CMS 4.2.0.1 XSS in BaseElementSelectInput.js
CVE-2022-37246 5.4 - Medium - September 21, 2022

Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line label: elementInfo.label.

XSS

Craft CMS 4.2.0.1 stored XSS via /admin/settings/fields
CVE-2022-37247 5.4 - Medium - September 16, 2022

Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page.

XSS

Craft CMS XSS via Drafts in 4.2.0.1
CVE-2022-37251 5.4 - Medium - September 16, 2022

Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via Drafts.

XSS

XSS in Craft CMS 4.2.0.1 via src/helpers/Cp.php
CVE-2022-37248 5.4 - Medium - September 16, 2022

Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via src/helpers/Cp.php.

XSS

Stored XSS in Craft CMS 4.2.0.1 /admin/myaccount
CVE-2022-37250 5.4 - Medium - September 16, 2022

Craft CMS 4.2.0.1 suffers from Stored Cross Site Scripting (XSS) in /admin/myaccount.

XSS

Craft CMS through 3.7.36
CVE-2022-29933 8.8 - High - May 09, 2022

Craft CMS through 3.7.36 allows a remote unauthenticated attacker, who knows at least one valid username, to reset the account's password and take over the account by providing a crafted HTTP header to the application while using the password reset functionality. Specifically, the attacker must send X-Forwarded-Host to the /index.php?p=admin/actions/users/send-password-reset-email URI. NOTE: the vendor's position is that a customer can already work around this by adjusting the configuration (i.e., by not using the default configuration).

Weak Password Recovery Mechanism for Forgotten Password

Craft CMS before 3.7.29
CVE-2022-28378 6.1 - Medium - April 03, 2022

Craft CMS before 3.7.29 allows XSS.

XSS

Craft CMS before 3.7.14
CVE-2021-41824 8.8 - High - September 30, 2021

Craft CMS before 3.7.14 allows CSV injection.

CSV Injection

An issue was discovered in Craft CMS before 3.6.7
CVE-2021-27903 9.8 - Critical - June 30, 2021

An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).

AuthZ

An issue was discovered in Craft CMS before 3.6.0
CVE-2021-27902 6.1 - Medium - June 30, 2021

An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.

XSS

Craft CMS before 3.6.13 has an XSS vulnerability.
CVE-2021-32470 6.1 - Medium - May 07, 2021

Craft CMS before 3.6.13 has an XSS vulnerability.

XSS

Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31
CVE-2020-19626 - March 26, 2021

Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31, allows remote attackers to inject arbitrary web script or HTML, via /admin/settings/sites/new.

The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection
CVE-2020-9757 - March 04, 2020

The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.

In the 3.1.12 Pro version of Craft CMS
CVE-2019-9554 - December 31, 2019

In the 3.1.12 Pro version of Craft CMS, XSS has been discovered in the header insertion field when adding source code at an s/admin/entries/news/new URI.

In Craft CMS through 3.1.7
CVE-2019-15929 9.8 - Critical - October 24, 2019

In Craft CMS through 3.1.7, the elevated session password prompt was not being rate limited like normal login forms, leading to the possibility of a brute force attempt on them.

Weak Password Recovery Mechanism for Forgotten Password

Craft CMS before 3.3.8 has stored XSS via a name field
CVE-2019-17496 - October 11, 2019

Craft CMS before 3.3.8 has stored XSS via a name field. This field is mishandled during site deletion.

In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data
CVE-2019-14280 - July 26, 2019

In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data from user-uploaded images when it was configured to do so, potentially exposing personal/geolocation data to the public.

Craft CMS before 3.1.31 does not properly filter XML feeds and thus
CVE-2019-12823 - June 18, 2019

Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS.

Craft CMS through 3.0.34
CVE-2018-20465 - December 25, 2018

Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.

index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25
CVE-2018-20418 - December 24, 2018

index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25 allows XSS by saving a new title from the console tab.

Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option
CVE-2018-3814 8.8 - High - January 01, 2018

Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option, because this allows a .jpg file to have embedded PHP code, and then be renamed to a .php extension.

Unrestricted File Upload

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Craftcms Craft Cms or by Craftcms? Click the Watch button to subscribe.

Craftcms
Vendor

subscribe