CVE-2026-25491: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms
CVE-2026-25491 is a stored cross-site scripting (XSS) vulnerability in Craft CMS versions from 5. 0. 0-RC1 up to 5. 8. 21. The issue arises because Entry Type names are not properly sanitized when displayed in the Entry Types list, allowing malicious scripts to be stored and executed in users' browsers. This vulnerability requires authenticated access with high privileges and some user interaction to trigger. Although the CVSS score is low (1. 9), the vulnerability can lead to limited confidentiality and integrity impacts. The flaw is fixed in version 5.
AI Analysis
Technical Summary
CVE-2026-25491 is a stored cross-site scripting (XSS) vulnerability identified in Craft CMS, a popular content management system used for building digital experiences. The vulnerability exists in versions from 5.0.0-RC1 through 5.8.21. Specifically, the flaw is due to improper neutralization of input during web page generation (CWE-79). Entry Type names, which are user-configurable labels within the CMS, are not sanitized before being rendered in the Entry Types list. This allows an attacker with authenticated access and high privileges to inject malicious JavaScript code into these names. When other users view the affected list, the malicious script executes in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability requires user interaction (viewing the list) and privileges to create or modify Entry Types, limiting its exploitation scope. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required for attack initiation but high privileges are needed (PR:H), and user interaction is required (UI:P). The impact on confidentiality and integrity is low, with no availability impact. The issue was resolved in Craft CMS version 5.8.22 by properly sanitizing Entry Type names before display. No public exploits have been reported to date, but the vulnerability poses a risk to organizations relying on Craft CMS for content management.
Potential Impact
For European organizations, this vulnerability could lead to targeted attacks against users with access to Craft CMS administrative interfaces. Exploitation could result in session hijacking or unauthorized actions performed in the context of a legitimate user, potentially compromising sensitive content or administrative controls. Although the CVSS score is low, the risk is elevated in environments where multiple users manage content and where attackers can gain or already have high-level access. The impact on confidentiality and integrity is limited but non-negligible, especially for organizations handling sensitive or regulated data. Disruption of content management workflows and potential reputational damage could also occur if malicious scripts are injected and executed. The lack of known exploits reduces immediate risk, but the widespread use of Craft CMS in Europe, particularly in media, education, and government sectors, means that unpatched systems remain vulnerable. Attackers could leverage this flaw as part of a broader attack chain, especially in targeted campaigns.
Mitigation Recommendations
European organizations should immediately upgrade Craft CMS installations to version 5.8.22 or later, where the vulnerability is fixed. In addition to patching, implement strict input validation and output encoding for all user-supplied data, especially Entry Type names and other customizable fields. Limit the number of users with high privileges who can create or modify Entry Types to reduce attack surface. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor CMS logs for unusual activity related to Entry Type modifications. Conduct regular security audits and penetration testing focused on CMS components. Educate administrators and content managers about the risks of XSS and the importance of applying security updates promptly. If upgrading is not immediately possible, consider restricting access to the CMS administration interface via network controls or VPNs to trusted users only.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium
CVE-2026-25491: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms
Description
CVE-2026-25491 is a stored cross-site scripting (XSS) vulnerability in Craft CMS versions from 5. 0. 0-RC1 up to 5. 8. 21. The issue arises because Entry Type names are not properly sanitized when displayed in the Entry Types list, allowing malicious scripts to be stored and executed in users' browsers. This vulnerability requires authenticated access with high privileges and some user interaction to trigger. Although the CVSS score is low (1. 9), the vulnerability can lead to limited confidentiality and integrity impacts. The flaw is fixed in version 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-25491 is a stored cross-site scripting (XSS) vulnerability identified in Craft CMS, a popular content management system used for building digital experiences. The vulnerability exists in versions from 5.0.0-RC1 through 5.8.21. Specifically, the flaw is due to improper neutralization of input during web page generation (CWE-79). Entry Type names, which are user-configurable labels within the CMS, are not sanitized before being rendered in the Entry Types list. This allows an attacker with authenticated access and high privileges to inject malicious JavaScript code into these names. When other users view the affected list, the malicious script executes in their browsers, potentially leading to session hijacking, unauthorized actions, or data theft. The vulnerability requires user interaction (viewing the list) and privileges to create or modify Entry Types, limiting its exploitation scope. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges required for attack initiation but high privileges are needed (PR:H), and user interaction is required (UI:P). The impact on confidentiality and integrity is low, with no availability impact. The issue was resolved in Craft CMS version 5.8.22 by properly sanitizing Entry Type names before display. No public exploits have been reported to date, but the vulnerability poses a risk to organizations relying on Craft CMS for content management.
Potential Impact
For European organizations, this vulnerability could lead to targeted attacks against users with access to Craft CMS administrative interfaces. Exploitation could result in session hijacking or unauthorized actions performed in the context of a legitimate user, potentially compromising sensitive content or administrative controls. Although the CVSS score is low, the risk is elevated in environments where multiple users manage content and where attackers can gain or already have high-level access. The impact on confidentiality and integrity is limited but non-negligible, especially for organizations handling sensitive or regulated data. Disruption of content management workflows and potential reputational damage could also occur if malicious scripts are injected and executed. The lack of known exploits reduces immediate risk, but the widespread use of Craft CMS in Europe, particularly in media, education, and government sectors, means that unpatched systems remain vulnerable. Attackers could leverage this flaw as part of a broader attack chain, especially in targeted campaigns.
Mitigation Recommendations
European organizations should immediately upgrade Craft CMS installations to version 5.8.22 or later, where the vulnerability is fixed. In addition to patching, implement strict input validation and output encoding for all user-supplied data, especially Entry Type names and other customizable fields. Limit the number of users with high privileges who can create or modify Entry Types to reduce attack surface. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor CMS logs for unusual activity related to Entry Type modifications. Conduct regular security audits and penetration testing focused on CMS components. Educate administrators and content managers about the risks of XSS and the importance of applying security updates promptly. If upgrading is not immediately possible, consider restricting access to the CMS administration interface via network controls or VPNs to trusted users only.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.823Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a36084b57a58fa16ab205
Added to database: 2/9/2026, 7:31:20 PM
Last enriched: 2/9/2026, 7:47:30 PM
Last updated: 2/9/2026, 8:38:24 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25740: CWE-250: Execution with Unnecessary Privileges in NixOS nixpkgs
MediumCVE-2026-25528: CWE-918: Server-Side Request Forgery (SSRF) in langchain-ai langsmith-sdk
MediumCVE-2026-25498: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms
HighCVE-2026-2246: Memory Corruption in AprilRobotics apriltag
MediumCVE-2026-25497: CWE-639: Authorization Bypass Through User-Controlled Key in craftcms cms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.