Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25495: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in craftcms cms

0
High
VulnerabilityCVE-2026-25495cvecve-2026-25495cwe-89
Published: Mon Feb 09 2026 (02/09/2026, 19:42:57 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

CVE-2026-25495 is a high-severity SQL Injection vulnerability in Craft CMS versions 4. 0. 0-RC1 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. The flaw exists in the element-indexes/get-elements endpoint, specifically via the criteria[orderBy] parameter in the JSON request body, which is not properly sanitized before being used in an SQL ORDER BY clause.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:45:16 UTC

Technical Analysis

CVE-2026-25495 is a SQL Injection vulnerability classified under CWE-89 affecting Craft CMS, a popular platform for building digital experiences. The vulnerability arises from improper neutralization of special elements in the criteria[orderBy] parameter within the element-indexes/get-elements API endpoint. Specifically, the application fails to sanitize or validate this input before incorporating it into the ORDER BY clause of an SQL query. An attacker who has authenticated Control Panel access can manipulate the orderBy parameter by omitting the viewState[order] or setting both parameters to the same malicious payload, enabling injection of arbitrary SQL commands. This can lead to unauthorized data access, data modification, or denial of service by corrupting or disrupting database queries. The vulnerability affects Craft CMS versions from 4.0.0-RC1 up to but not including 4.16.18, and from 5.0.0-RC1 up to but not including 5.8.22. The CVSS 4.0 base score is 8.7, indicating a high severity due to network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the presence of this vulnerability in widely used CMS software poses a significant risk if left unpatched.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Craft CMS is used by many businesses, agencies, and institutions to manage web content and digital experiences. Exploitation could lead to unauthorized disclosure of sensitive data stored in backend databases, including user information, business data, and configuration details. Attackers could also modify or delete data, leading to integrity loss and potential service outages. Given the vulnerability requires authenticated Control Panel access, insider threats or compromised credentials could be leveraged to exploit this flaw. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and financial losses. Additionally, disruption of web services could affect customer-facing portals and internal operations. The high CVSS score reflects the critical nature of the impact on confidentiality, integrity, and availability. Organizations relying on Craft CMS for critical digital services in Europe should consider this a priority risk.

Mitigation Recommendations

European organizations should immediately verify their Craft CMS version and upgrade to 4.16.18 or 5.8.22 or later, where the vulnerability is patched. If immediate upgrading is not feasible, restrict Control Panel access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the criteria[orderBy] parameter. Conduct thorough auditing and monitoring of Control Panel access logs to detect anomalous activities. Additionally, review and harden database permissions to limit the potential damage of SQL injection attacks. Regularly back up databases and test restoration procedures to mitigate the impact of potential data corruption or loss. Finally, educate administrators about the risks of SQL injection and the importance of applying vendor patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.824Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a3d0c4b57a58fa16d39dc

Added to database: 2/9/2026, 8:01:16 PM

Last enriched: 2/17/2026, 9:45:16 AM

Last updated: 2/21/2026, 12:20:14 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats