Description
Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a targetFilename body parameter that is used unsanitized in a deleteFile() call before Assets::prepareAssetName() is applied on save. This allows an authenticated user with replaceFiles permission to delete arbitrary files within the same filesystem root by injecting ../ path traversal sequences into the filename. This could allow an authenticated user with replaceFiles permission on one volume to delete files in other folders/volumes that share the same filesystem root. This only affects local filesystems. This issue has been patched in versions 4.17.5 and 5.9.11.
INFO
Published Date :
2026-03-16T18:57:46.516Z
Last Modified :
2026-03-17T15:22:08.875Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32262 vulnerability.
| Vendors | Products |
|---|---|
| Craftcms |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32262.