CVE-2026-31858

🟡 Monitoruj

Brak ochrony w ElementSearchController w Craft CMS umożliwia uwierzytelnionym użytkownikom wstrzyknięcie SQL, co prowadzi do wycieku danych z bazy.

CVSS
8.8
EPSS
0.0%
Exploit
none
Vendor
craftcms
Opis źródłowy (NVD)

Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in CVE-2026-25495. The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it. Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query properties, and extract the full database contents via boolean-based blind injection. Users should update to the patched 5.9.9 release to mitigate the issue.

sql-injection Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS8.8
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.0%
Opublikowano (NVD)2026-03-11 18:16:24 UTC
Ostatnia modyfikacja (NVD)2026-03-17 14:05:38 UTC
Referencje