Skip to content

Commit 597a587

Browse files
1 parent d246f4d commit 597a587

3 files changed

Lines changed: 217 additions & 0 deletions

File tree

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4484-8v2f-5748",
4+
"modified": "2026-03-16T18:13:15Z",
5+
"published": "2026-03-16T18:13:15Z",
6+
"aliases": [
7+
"CVE-2026-32264"
8+
],
9+
"summary": "Craft CMS vulnerable to behavior injection RCE ElementIndexesController and FieldsController",
10+
"details": "The fix for https://github.com/advisories/GHSA-7jx7-3846-m7w7 (commit https://github.com/craftcms/cms/commit/395c64f0b80b507be1c862a2ec942eaacb353748) only patched `src/services/Fields.php`, but the same vulnerable pattern exists in `ElementIndexesController` and `FieldsController`.\n\nYou need Craft control panel administrator permissions, and allowAdminChanges must be enabled for this to work.\n\nAn attacker can use the same gadget chain from the original advisory to achieve RCE.\n\nUsers should update to Craft 4.17.5 and 5.9.11 to mitigate the issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "craftcms/cms"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "4.0.0-RC1"
29+
},
30+
{
31+
"fixed": "4.17.5"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 4.17.4"
38+
}
39+
},
40+
{
41+
"package": {
42+
"ecosystem": "Packagist",
43+
"name": "craftcms/cms"
44+
},
45+
"ranges": [
46+
{
47+
"type": "ECOSYSTEM",
48+
"events": [
49+
{
50+
"introduced": "5.0.0-RC1"
51+
},
52+
{
53+
"fixed": "5.9.11"
54+
}
55+
]
56+
}
57+
],
58+
"database_specific": {
59+
"last_known_affected_version_range": "<= 5.9.10"
60+
}
61+
}
62+
],
63+
"references": [
64+
{
65+
"type": "WEB",
66+
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-4484-8v2f-5748"
67+
},
68+
{
69+
"type": "WEB",
70+
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-7jx7-3846-m7w7"
71+
},
72+
{
73+
"type": "WEB",
74+
"url": "https://github.com/craftcms/cms/commit/78d181e12e0b15e1300f54ec85f19859d3300f70"
75+
},
76+
{
77+
"type": "WEB",
78+
"url": "https://github.com/craftcms/cms/commit/dfec46362fcb40b330ce8a4d8136446e65085620"
79+
},
80+
{
81+
"type": "PACKAGE",
82+
"url": "https://github.com/craftcms/cms"
83+
}
84+
],
85+
"database_specific": {
86+
"cwe_ids": [
87+
"CWE-470"
88+
],
89+
"severity": "HIGH",
90+
"github_reviewed": true,
91+
"github_reviewed_at": "2026-03-16T18:13:15Z",
92+
"nvd_published_at": null
93+
}
94+
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-67cr-jmh8-4jpq",
4+
"modified": "2026-03-16T18:14:23Z",
5+
"published": "2026-03-16T18:14:23Z",
6+
"aliases": [
7+
"CVE-2026-32266"
8+
],
9+
"summary": "Google Cloud Storage for Craft CMS has an Information Disclosure Vulnerability",
10+
"details": "Unauthenticated users can view a list of buckets the plugin has access to.\n\nThe `DefaultController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see.\n\nUsers should update to version 2.2.1 of the plugin to mitigate the issue.",
11+
"severity": [],
12+
"affected": [
13+
{
14+
"package": {
15+
"ecosystem": "Packagist",
16+
"name": "craftcms/google-cloud"
17+
},
18+
"ranges": [
19+
{
20+
"type": "ECOSYSTEM",
21+
"events": [
22+
{
23+
"introduced": "2.0.0-beta.1"
24+
},
25+
{
26+
"fixed": "2.2.1"
27+
}
28+
]
29+
}
30+
],
31+
"database_specific": {
32+
"last_known_affected_version_range": "<= 2.2.0"
33+
}
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/craftcms/google-cloud/security/advisories/GHSA-67cr-jmh8-4jpq"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/craftcms/google-cloud/commit/651bacaa5f5fd7813e4075e0747b1d706391fb2c"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/craftcms/google-cloud"
48+
}
49+
],
50+
"database_specific": {
51+
"cwe_ids": [
52+
"CWE-200"
53+
],
54+
"severity": "LOW",
55+
"github_reviewed": true,
56+
"github_reviewed_at": "2026-03-16T18:14:23Z",
57+
"nvd_published_at": null
58+
}
59+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hwj7-4vgc-j3v9",
4+
"modified": "2026-03-16T18:13:33Z",
5+
"published": "2026-03-16T18:13:33Z",
6+
"aliases": [
7+
"CVE-2026-32265"
8+
],
9+
"summary": "Amazon S3 for Craft CMS has an Information Disclosure vulnerability",
10+
"details": "Unauthenticated users can view a list of buckets the plugin has access to.\n\nThe `BucketsController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see.\n\nUsers should update to version 2.2.5 of the plugin to mitigate the issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "craftcms/aws-s3"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.2"
29+
},
30+
{
31+
"fixed": "2.2.5"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 2.2.4"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/craftcms/aws-s3/security/advisories/GHSA-hwj7-4vgc-j3v9"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/craftcms/aws-s3/commit/ef8904d8b6856e4a52893a9e1e52988ae110aa3f"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/craftcms/aws-s3"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-200"
58+
],
59+
"severity": "MODERATE",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2026-03-16T18:13:33Z",
62+
"nvd_published_at": null
63+
}
64+
}

0 commit comments

Comments
 (0)