Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25498: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms

0
High
VulnerabilityCVE-2026-25498cvecve-2026-25498cwe-470
Published: Mon Feb 09 2026 (02/09/2026, 19:55:06 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

CVE-2026-25498 is a high-severity Remote Code Execution (RCE) vulnerability in Craft CMS versions 4. 0. 0-RC1 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. It arises from unsafe reflection due to insufficient sanitization of user-supplied configuration data in the assembleLayoutFromPost() function, allowing authenticated administrators to inject malicious Yii2 behavior configurations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:45:53 UTC

Technical Analysis

CVE-2026-25498 is a Remote Code Execution vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting Craft CMS versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21. The vulnerability exists in the assembleLayoutFromPost() function within src/services/Fields.php, where user-supplied configuration data is passed unsanitized to the Craft::createObject() method. This method is responsible for instantiating Yii2 behavior objects based on configuration arrays. Because the input is not properly validated or sanitized, an authenticated administrator can craft malicious Yii2 behavior configurations that execute arbitrary system commands on the hosting server. This vulnerability is a variant of a previously addressed behavior injection flaw (CVE-2025-68455) but affects different endpoints and code paths, indicating a broader attack surface. The vulnerability does not require user interaction beyond administrator authentication, and no public exploits have been reported yet. The flaw is fixed in Craft CMS version 5.8.22. The CVSS 4.0 score is 8.6 (high), reflecting network attack vector, low attack complexity, no user interaction, but requiring high privileges (administrator), with high impact on confidentiality, integrity, and availability. This vulnerability enables attackers with admin credentials to execute arbitrary commands, potentially leading to full system compromise, data theft, or service disruption.

Potential Impact

For European organizations, the impact of CVE-2026-25498 can be severe. Craft CMS is widely used by enterprises, government agencies, and digital service providers for managing web content and digital experiences. Successful exploitation allows an attacker with administrator access to execute arbitrary system commands, potentially leading to full server compromise, data breaches, defacement, or ransomware deployment. This can disrupt critical digital services, damage organizational reputation, and lead to regulatory penalties under GDPR if personal data is exposed. The vulnerability's requirement for administrator privileges limits exposure to insider threats or attackers who have already compromised lower-level accounts, but privilege escalation or credential theft could enable exploitation. Given the high impact on confidentiality, integrity, and availability, organizations relying on Craft CMS for public-facing websites or internal portals face significant operational and security risks.

Mitigation Recommendations

To mitigate CVE-2026-25498, organizations should immediately upgrade Craft CMS installations to version 5.8.22 or later, where the vulnerability is patched. If immediate patching is not possible, restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Conduct thorough audits of administrator accounts and revoke unnecessary privileges. Implement strict input validation and sanitization on all user-supplied configuration data, especially in custom plugins or modules interacting with Yii2 behaviors. Monitor server logs for suspicious activity related to behavior configuration changes or command execution attempts. Employ network segmentation and host-based intrusion detection systems to detect and prevent lateral movement in case of compromise. Regularly back up critical data and test incident response plans to minimize downtime and data loss in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.824Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a408f4b57a58fa16e1631

Added to database: 2/9/2026, 8:16:15 PM

Last enriched: 2/17/2026, 9:45:53 AM

Last updated: 3/27/2026, 1:16:41 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses