CVE-2026-25492: CWE-918: Server-Side Request Forgery (SSRF) in craftcms cms
CVE-2026-25492 is a Server-Side Request Forgery (SSRF) vulnerability in Craft CMS versions 3. 5. 0 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. It arises from the save_images_Asset GraphQL mutation, which improperly validates hostnames and allows fetching internal URLs by resolving domain names to internal IP addresses.
AI Analysis
Technical Summary
CVE-2026-25492 is a medium-severity SSRF vulnerability affecting Craft CMS, a popular content management system. The flaw exists in the save_images_Asset GraphQL mutation, which is designed to save image assets. This mutation accepts a domain name parameter that is intended to point to image resources. However, in affected versions (3.5.0 through 4.16.17 and 5.0.0-RC1 through 5.8.21), hostname validation is insufficient, allowing an attacker to supply domain names resolving to internal IP addresses. This enables the server to make unauthorized HTTP requests to internal network resources. Furthermore, if the CMS configuration allows non-image file extensions such as .txt, the downstream image validation can be bypassed. This combination allows an authenticated attacker with permission to invoke save_images_Asset to retrieve sensitive internal data, including AWS instance metadata credentials, which can lead to further compromise of cloud infrastructure. The vulnerability does not require user interaction and can be exploited remotely with low complexity, but it requires the attacker to have authenticated access with specific permissions. The issue has been patched in Craft CMS versions 4.16.18 and 5.8.22. No public exploits have been reported yet, but the potential for sensitive data exposure and cloud credential theft makes this a significant risk for affected deployments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized internal network access and sensitive data exposure, particularly in cloud-hosted environments using AWS. Attackers exploiting this SSRF flaw can access internal services that are otherwise inaccessible externally, potentially retrieving metadata credentials that enable lateral movement, privilege escalation, or data exfiltration. This can compromise confidentiality and integrity of critical systems and data. Organizations relying on Craft CMS for their websites or intranet portals may face service disruption or reputational damage if exploited. The medium CVSS score reflects moderate impact, but the ability to access cloud credentials elevates the risk in environments heavily dependent on cloud infrastructure. Given the widespread use of Craft CMS in Europe, especially in sectors like media, education, and government, the vulnerability could be leveraged for targeted attacks or espionage. The absence of known exploits in the wild suggests a window for proactive remediation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately upgrade Craft CMS to versions 4.16.18 or 5.8.22 or later to apply the official patches addressing this SSRF vulnerability. In addition, administrators should audit GraphQL permissions to restrict save_images_Asset mutation access only to trusted and necessary users. Review and tighten allowed file extensions for image uploads, disallowing non-image types such as .txt to prevent bypassing validation. Implement network segmentation and firewall rules to limit the CMS server's ability to make outbound requests to internal IP ranges and cloud metadata endpoints. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with SSRF detection capabilities to monitor and block suspicious internal requests. Regularly scan and monitor logs for unusual GraphQL mutation usage or unexpected internal network access attempts. Finally, conduct security awareness training for developers and administrators on secure CMS configuration and patch management best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2026-25492: CWE-918: Server-Side Request Forgery (SSRF) in craftcms cms
Description
CVE-2026-25492 is a Server-Side Request Forgery (SSRF) vulnerability in Craft CMS versions 3. 5. 0 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. It arises from the save_images_Asset GraphQL mutation, which improperly validates hostnames and allows fetching internal URLs by resolving domain names to internal IP addresses.
AI-Powered Analysis
Technical Analysis
CVE-2026-25492 is a medium-severity SSRF vulnerability affecting Craft CMS, a popular content management system. The flaw exists in the save_images_Asset GraphQL mutation, which is designed to save image assets. This mutation accepts a domain name parameter that is intended to point to image resources. However, in affected versions (3.5.0 through 4.16.17 and 5.0.0-RC1 through 5.8.21), hostname validation is insufficient, allowing an attacker to supply domain names resolving to internal IP addresses. This enables the server to make unauthorized HTTP requests to internal network resources. Furthermore, if the CMS configuration allows non-image file extensions such as .txt, the downstream image validation can be bypassed. This combination allows an authenticated attacker with permission to invoke save_images_Asset to retrieve sensitive internal data, including AWS instance metadata credentials, which can lead to further compromise of cloud infrastructure. The vulnerability does not require user interaction and can be exploited remotely with low complexity, but it requires the attacker to have authenticated access with specific permissions. The issue has been patched in Craft CMS versions 4.16.18 and 5.8.22. No public exploits have been reported yet, but the potential for sensitive data exposure and cloud credential theft makes this a significant risk for affected deployments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized internal network access and sensitive data exposure, particularly in cloud-hosted environments using AWS. Attackers exploiting this SSRF flaw can access internal services that are otherwise inaccessible externally, potentially retrieving metadata credentials that enable lateral movement, privilege escalation, or data exfiltration. This can compromise confidentiality and integrity of critical systems and data. Organizations relying on Craft CMS for their websites or intranet portals may face service disruption or reputational damage if exploited. The medium CVSS score reflects moderate impact, but the ability to access cloud credentials elevates the risk in environments heavily dependent on cloud infrastructure. Given the widespread use of Craft CMS in Europe, especially in sectors like media, education, and government, the vulnerability could be leveraged for targeted attacks or espionage. The absence of known exploits in the wild suggests a window for proactive remediation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately upgrade Craft CMS to versions 4.16.18 or 5.8.22 or later to apply the official patches addressing this SSRF vulnerability. In addition, administrators should audit GraphQL permissions to restrict save_images_Asset mutation access only to trusted and necessary users. Review and tighten allowed file extensions for image uploads, disallowing non-image types such as .txt to prevent bypassing validation. Implement network segmentation and firewall rules to limit the CMS server's ability to make outbound requests to internal IP ranges and cloud metadata endpoints. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with SSRF detection capabilities to monitor and block suspicious internal requests. Regularly scan and monitor logs for unusual GraphQL mutation usage or unexpected internal network access attempts. Finally, conduct security awareness training for developers and administrators on secure CMS configuration and patch management best practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.823Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a3d0c4b57a58fa16d39cd
Added to database: 2/9/2026, 8:01:16 PM
Last enriched: 2/17/2026, 9:44:28 AM
Last updated: 2/21/2026, 12:16:40 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.