Description
Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue.
INFO
Published Date :
2026-03-11T17:30:29.092Z
Last Modified :
2026-03-12T14:02:26.953Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-31857 vulnerability.
| Vendors | Products |
|---|---|
| Craftcms |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-31857.