Craftcms Craft Cms
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Craftcms Craft Cms.
By the Year
In 2026 there have been 1 vulnerability in Craftcms Craft Cms with an average score of 9.8 out of ten. Last year, in 2025 Craft Cms had 3 security vulnerabilities published. At the current rates, it appears that the number of vulnerabilities last year and this year may equal out. However, the average CVE base score of the vulnerabilities in 2026 is greater by 2.00.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 9.80 |
| 2025 | 3 | 7.80 |
| 2024 | 10 | 7.19 |
| 2023 | 14 | 6.50 |
| 2022 | 8 | 6.18 |
| 2021 | 5 | 7.70 |
| 2020 | 1 | 0.00 |
| 2019 | 5 | 9.80 |
| 2018 | 3 | 8.80 |
It may take a day or so for new Craft Cms vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Craftcms Craft Cms Security Vulnerabilities
CraftCMS 3 vCard Plugin 1.0.0: Unauthenticated PHP Deserialization RCE
CVE-2020-37071
9.8 - Critical
- February 03, 2026
CraftCMS 3 vCard Plugin 1.0.0 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through a crafted payload. Attackers can generate a malicious serialized payload that triggers remote code execution by exploiting the plugin's vCard download functionality with a specially crafted request.
Marshaling, Unmarshaling
Craft CMS 5.7.5/4.15.3: Unauth Stored Arbitrary Content in Session Files (PHP)
CVE-2025-35939
5.3 - Medium
- May 07, 2025
Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named 'sess_[session_value]', where '[session_value]' is provided to the client in a 'Set-Cookie' response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.
Assumed-Immutable Parameter Tampering
Craft CMS RCE 3-5.x Before 3.9.15/4.14.15/5.6.17
CVE-2025-32432
10 - Critical
- April 25, 2025
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
Code Injection
RCE in Craft CMS prior to 5.5.8/4.13.8 when security key compromised
CVE-2025-23209
8.1 - High
- January 18, 2025
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
Code Injection
Craft CMS Remote Code Execution Vulnerability via PHP register_argc_argv
CVE-2024-56145
- December 18, 2024
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
Code Injection
LFS Bypass & SSTI RCE in CraftCMS <5.4.6/4.12.5 via double file://
CVE-2024-52291
7.2 - High
- November 13, 2024
Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.
Directory traversal
Exploitable File Exfiltration via dataUrl in Craft CMS before 5.4.9
CVE-2024-52292
6.5 - Medium
- November 13, 2024
Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.
Directory traversal
Craft CMS Remote Code Execution via Twig SSTI in FileHelper::absolutePath
CVE-2024-52293
7.2 - High
- November 13, 2024
Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.
Directory traversal
Craft CMS 5 Stored XSS via Breadcrumb & Title Fields
CVE-2024-45406
4.8 - Medium
- September 09, 2024
Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.
XSS
Craft CMS 5 TOTP Token Replay Allows Reauth Before 5.2.3
CVE-2024-41800
7.5 - High
- July 25, 2024
Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3.
authentification
Craft CMS v3.x SQLi via GraphQL API before 3.7.31
CVE-2024-37843
9.8 - Critical
- June 25, 2024
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
SQL Injection
Craft CMS Audit Plugin XSS before v3.0.2
CVE-2023-36259
5.4 - Medium
- January 30, 2024
Cross Site Scripting (XSS) vulnerability in Craft CMS Audit Plugin before version 3.0.2 allows attackers to execute arbitrary code during user creation.
XSS
DoS via crafted FeedMe strings in v4.6.1 (Asset vol absent)
CVE-2023-36260
7.5 - High
- January 30, 2024
An issue was discovered in the Feed Me plugin 4.6.1 for Craft CMS. It allows remote attackers to cause a denial of service (DoS) via crafted strings to Feed-Me Name and Feed-Me URL fields, due to saving a feed using an Asset element type with no volume selected. NOTE: this is not a report about code provided by the Craft CMS product; it is only a report about the Feed Me plugin. NOTE: a third-party report states that commit b5d6ede51848349bd91bc95fec288b6793f15e28 has "nothing to do with security."
Injection
CVE-2024-21622: Craft CMS privilege escalation before 3.9.6/4.4.16
CVE-2024-21622
8.8 - High
- January 03, 2024
Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.
Craft CMS CVE-2023-41892 Before 4.4.15 High-Impact Vulnerability
CVE-2023-41892
9.8 - Critical
- September 13, 2023
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
Code Injection
Remote Code Execution in Craft CMS 4.4 & 3.8 via Path Validation Bypass
CVE-2023-40035
7.2 - High
- August 23, 2023
Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.
Injection
Craft CMS 4.4.9 HTML Injection Vulnerability
CVE-2023-33495
6.1 - Medium
- June 20, 2023
Craft CMS through 4.4.9 is vulnerable to HTML Injection.
XSS
CraftCMS 3.7.59 SSTI via User Photo Location Field (RCE)
CVE-2023-30179
7.2 - High
- June 13, 2023
CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default.
Code Injection
Craft CMS XSS via malformed RSS feed, fixed in 4.4.6
CVE-2023-33195
6.1 - Medium
- May 27, 2023
Craft is a CMS for creating custom digital experiences on the web. A malformed RSS feed can deliver an XSS payload. This issue was patched in version 4.4.6.
XSS
Craft CMS 4.4.6 XSS in Quick Post error message (v4.4.6 patched)
CVE-2023-33194
4.8 - Medium
- May 26, 2023
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didnt fix it when clicking save. This issue was patched in version 4.4.6.
XSS
Craft CMS XSS via review volume before 4.4.7
CVE-2023-33196
5.4 - Medium
- May 26, 2023
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
XSS
Craft CMS <4.4.6 XSS via Update Asset Index Utility
CVE-2023-33197
5.4 - Medium
- May 26, 2023
Craft is a CMS for creating custom digital experiences on the web. Cross-site scripting (XSS) can be triggered via the Update Asset Index utility. This issue has been patched in version 4.4.6.
XSS
Stored XSS via field names in Craft CMS <=4.4.11
CVE-2023-2817
5.4 - Medium
- May 26, 2023
A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively.
XSS
Craft CMS 4.x RCE via Unrestricted File Extension in View.php (before 4.4.6)
CVE-2023-32679
7.2 - High
- May 19, 2023
Craft CMS is an open source content management system. In affected versions of Craft CMS an unrestricted file extension may lead to Remote Code Execution. If the name parameter value is not empty string('') in the View.php's doesTemplateExist() -> resolveTemplate() -> _resolveTemplateInternal() -> _resolveTemplate() function, it returns directly without extension verification, so that arbitrary extension files are rendered as twig templates. When attacker with admin privileges on a DEV or an improperly configured STG or PROD environment, they can exploit this vulnerability to remote code execution. Code execution may grant the attacker access to the host operating system. This issue has been addressed in version 4.4.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Injection
RCE in CraftCMS v3.8.1 via crafted Section param script
CVE-2023-30130
8.8 - High
- May 12, 2023
An issue found in CraftCMS v.3.8.1 allows a remote attacker to execute arbitrary code via a crafted script to the Section parameter.
Code Injection
Craft CMS XSS via malformed title in Feed Widget (v3.0.0-3.8.3, 4.0-4.4.3)
CVE-2023-31144
6.1 - Medium
- May 09, 2023
Craft CMS is a content management system. Starting in version 3.0.0 and prior to versions 3.8.4 and 4.4.4, a malformed title in the feed widget can deliver a cross-site scripting payload. This issue is fixed in version 3.8.4 and 4.4.4.
XSS
CraftCMS 3.7.59 XSS in Volume Name (PHP CMS, Pixel & Tonic)
CVE-2023-30177
6.1 - Medium
- April 25, 2023
CraftCMS 3.7.59 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.
XSS
XSS via label/instruction in Craft CMS admin quick post widget pre-4.3.7
CVE-2023-23927
5.4 - Medium
- March 03, 2023
Craft is a platform for creating digital experiences. When you insert a payload inside a label name or instruction of an entry type, an cross-site scripting (XSS) happens in the quick post widget on the admin dashboard. This issue has been fixed in version 4.3.7.
XSS
Craft CMS 3.0.0-3.7.32 Password Hash Disclosure via CRAFT_CSRF_TOKEN
CVE-2022-37783
7.5 - High
- December 05, 2022
All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.
Insufficiently Protected Credentials
Craft CMS 4.2.0.1 XSS in BaseElementSelectInput.js
CVE-2022-37246
5.4 - Medium
- September 21, 2022
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line label: elementInfo.label.
XSS
Craft CMS 4.2.0.1 stored XSS via /admin/settings/fields
CVE-2022-37247
5.4 - Medium
- September 16, 2022
Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page.
XSS
Craft CMS XSS via Drafts in 4.2.0.1
CVE-2022-37251
5.4 - Medium
- September 16, 2022
Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via Drafts.
XSS
XSS in Craft CMS 4.2.0.1 via src/helpers/Cp.php
CVE-2022-37248
5.4 - Medium
- September 16, 2022
Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via src/helpers/Cp.php.
XSS
Stored XSS in Craft CMS 4.2.0.1 /admin/myaccount
CVE-2022-37250
5.4 - Medium
- September 16, 2022
Craft CMS 4.2.0.1 suffers from Stored Cross Site Scripting (XSS) in /admin/myaccount.
XSS
Craft CMS through 3.7.36
CVE-2022-29933
8.8 - High
- May 09, 2022
Craft CMS through 3.7.36 allows a remote unauthenticated attacker, who knows at least one valid username, to reset the account's password and take over the account by providing a crafted HTTP header to the application while using the password reset functionality. Specifically, the attacker must send X-Forwarded-Host to the /index.php?p=admin/actions/users/send-password-reset-email URI. NOTE: the vendor's position is that a customer can already work around this by adjusting the configuration (i.e., by not using the default configuration).
Weak Password Recovery Mechanism for Forgotten Password
Craft CMS before 3.7.29
CVE-2022-28378
6.1 - Medium
- April 03, 2022
Craft CMS before 3.7.29 allows XSS.
XSS
Craft CMS before 3.7.14
CVE-2021-41824
8.8 - High
- September 30, 2021
Craft CMS before 3.7.14 allows CSV injection.
CSV Injection
An issue was discovered in Craft CMS before 3.6.7
CVE-2021-27903
9.8 - Critical
- June 30, 2021
An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).
AuthZ
An issue was discovered in Craft CMS before 3.6.0
CVE-2021-27902
6.1 - Medium
- June 30, 2021
An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
XSS
Craft CMS before 3.6.13 has an XSS vulnerability.
CVE-2021-32470
6.1 - Medium
- May 07, 2021
Craft CMS before 3.6.13 has an XSS vulnerability.
XSS
Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31
CVE-2020-19626
- March 26, 2021
Cross Site Scripting (XSS) vulnerability in craftcms 3.1.31, allows remote attackers to inject arbitrary web script or HTML, via /admin/settings/sites/new.
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection
CVE-2020-9757
- March 04, 2020
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
In the 3.1.12 Pro version of Craft CMS
CVE-2019-9554
- December 31, 2019
In the 3.1.12 Pro version of Craft CMS, XSS has been discovered in the header insertion field when adding source code at an s/admin/entries/news/new URI.
In Craft CMS through 3.1.7
CVE-2019-15929
9.8 - Critical
- October 24, 2019
In Craft CMS through 3.1.7, the elevated session password prompt was not being rate limited like normal login forms, leading to the possibility of a brute force attempt on them.
Weak Password Recovery Mechanism for Forgotten Password
Craft CMS before 3.3.8 has stored XSS via a name field
CVE-2019-17496
- October 11, 2019
Craft CMS before 3.3.8 has stored XSS via a name field. This field is mishandled during site deletion.
In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data
CVE-2019-14280
- July 26, 2019
In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data from user-uploaded images when it was configured to do so, potentially exposing personal/geolocation data to the public.
Craft CMS before 3.1.31 does not properly filter XML feeds and thus
CVE-2019-12823
- June 18, 2019
Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS.
Craft CMS through 3.0.34
CVE-2018-20465
- December 25, 2018
Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25
CVE-2018-20418
- December 24, 2018
index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25 allows XSS by saving a new title from the console tab.
Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option
CVE-2018-3814
8.8 - High
- January 01, 2018
Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option, because this allows a .jpg file to have embedded PHP code, and then be renamed to a .php extension.
Unrestricted File Upload
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Craftcms Craft Cms or by Craftcms? Click the Watch button to subscribe.