Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qc86-q28f-ggww | Craft CMS has potential authenticated Remote Code Execution via Twig SSTI |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Craft is a content management system (CMS). Prior to 5.8.22 and 4.16.18, it is possible to craft a malicious payload using the Twig map filter in text fields that accept Twig input under Settings in the Craft control panel or using the System Messages utility, which could lead to a RCE. For this to work, you must have administrator access to the Craft Control Panel, and allowAdminChanges must be enabled for this to work, which is against our recommendations for any non-dev environment. Alternatively, you can have a non-administrator account with allowAdminChanges disabled, but you have access to the System Messages utility. Users should update to the patched versions (5.8.22 and 4.16.18) to mitigate the issue. | |
| Title | Craft is affected by potential authenticated Remote Code Execution via Twig SSTI | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-04T17:33:06.668Z
Reserved: 2026-03-03T14:25:19.244Z
Link: CVE-2026-28784
Updated: 2026-03-04T17:32:59.818Z
Status : Awaiting Analysis
Published: 2026-03-04T17:16:21.853
Modified: 2026-03-04T18:08:05.730
Link: CVE-2026-28784
No data.
OpenCVE Enrichment
No data.
Github GHSA