CVE-2026-25498: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms
CVE-2026-25498 is a high-severity Remote Code Execution (RCE) vulnerability in Craft CMS versions 4. 0. 0-RC1 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. It arises from unsafe reflection due to insufficient sanitization of user-supplied configuration data in the assembleLayoutFromPost() function, allowing authenticated administrators to inject malicious Yii2 behavior configurations.
AI Analysis
Technical Summary
CVE-2026-25498 is a Remote Code Execution vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting Craft CMS versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21. The vulnerability exists in the assembleLayoutFromPost() function within src/services/Fields.php, where user-supplied configuration data is passed unsanitized to the Craft::createObject() method. This method is responsible for instantiating Yii2 behavior objects based on configuration arrays. Because the input is not properly validated or sanitized, an authenticated administrator can craft malicious Yii2 behavior configurations that execute arbitrary system commands on the hosting server. This vulnerability is a variant of a previously addressed behavior injection flaw (CVE-2025-68455) but affects different endpoints and code paths, indicating a broader attack surface. The vulnerability does not require user interaction beyond administrator authentication, and no public exploits have been reported yet. The flaw is fixed in Craft CMS version 5.8.22. The CVSS 4.0 score is 8.6 (high), reflecting network attack vector, low attack complexity, no user interaction, but requiring high privileges (administrator), with high impact on confidentiality, integrity, and availability. This vulnerability enables attackers with admin credentials to execute arbitrary commands, potentially leading to full system compromise, data theft, or service disruption.
Potential Impact
For European organizations, the impact of CVE-2026-25498 can be severe. Craft CMS is widely used by enterprises, government agencies, and digital service providers for managing web content and digital experiences. Successful exploitation allows an attacker with administrator access to execute arbitrary system commands, potentially leading to full server compromise, data breaches, defacement, or ransomware deployment. This can disrupt critical digital services, damage organizational reputation, and lead to regulatory penalties under GDPR if personal data is exposed. The vulnerability's requirement for administrator privileges limits exposure to insider threats or attackers who have already compromised lower-level accounts, but privilege escalation or credential theft could enable exploitation. Given the high impact on confidentiality, integrity, and availability, organizations relying on Craft CMS for public-facing websites or internal portals face significant operational and security risks.
Mitigation Recommendations
To mitigate CVE-2026-25498, organizations should immediately upgrade Craft CMS installations to version 5.8.22 or later, where the vulnerability is patched. If immediate patching is not possible, restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Conduct thorough audits of administrator accounts and revoke unnecessary privileges. Implement strict input validation and sanitization on all user-supplied configuration data, especially in custom plugins or modules interacting with Yii2 behaviors. Monitor server logs for suspicious activity related to behavior configuration changes or command execution attempts. Employ network segmentation and host-based intrusion detection systems to detect and prevent lateral movement in case of compromise. Regularly back up critical data and test incident response plans to minimize downtime and data loss in case of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-25498: CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in craftcms cms
Description
CVE-2026-25498 is a high-severity Remote Code Execution (RCE) vulnerability in Craft CMS versions 4. 0. 0-RC1 through 4. 16. 17 and 5. 0. 0-RC1 through 5. 8. 21. It arises from unsafe reflection due to insufficient sanitization of user-supplied configuration data in the assembleLayoutFromPost() function, allowing authenticated administrators to inject malicious Yii2 behavior configurations.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25498 is a Remote Code Execution vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting Craft CMS versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21. The vulnerability exists in the assembleLayoutFromPost() function within src/services/Fields.php, where user-supplied configuration data is passed unsanitized to the Craft::createObject() method. This method is responsible for instantiating Yii2 behavior objects based on configuration arrays. Because the input is not properly validated or sanitized, an authenticated administrator can craft malicious Yii2 behavior configurations that execute arbitrary system commands on the hosting server. This vulnerability is a variant of a previously addressed behavior injection flaw (CVE-2025-68455) but affects different endpoints and code paths, indicating a broader attack surface. The vulnerability does not require user interaction beyond administrator authentication, and no public exploits have been reported yet. The flaw is fixed in Craft CMS version 5.8.22. The CVSS 4.0 score is 8.6 (high), reflecting network attack vector, low attack complexity, no user interaction, but requiring high privileges (administrator), with high impact on confidentiality, integrity, and availability. This vulnerability enables attackers with admin credentials to execute arbitrary commands, potentially leading to full system compromise, data theft, or service disruption.
Potential Impact
For European organizations, the impact of CVE-2026-25498 can be severe. Craft CMS is widely used by enterprises, government agencies, and digital service providers for managing web content and digital experiences. Successful exploitation allows an attacker with administrator access to execute arbitrary system commands, potentially leading to full server compromise, data breaches, defacement, or ransomware deployment. This can disrupt critical digital services, damage organizational reputation, and lead to regulatory penalties under GDPR if personal data is exposed. The vulnerability's requirement for administrator privileges limits exposure to insider threats or attackers who have already compromised lower-level accounts, but privilege escalation or credential theft could enable exploitation. Given the high impact on confidentiality, integrity, and availability, organizations relying on Craft CMS for public-facing websites or internal portals face significant operational and security risks.
Mitigation Recommendations
To mitigate CVE-2026-25498, organizations should immediately upgrade Craft CMS installations to version 5.8.22 or later, where the vulnerability is patched. If immediate patching is not possible, restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Conduct thorough audits of administrator accounts and revoke unnecessary privileges. Implement strict input validation and sanitization on all user-supplied configuration data, especially in custom plugins or modules interacting with Yii2 behaviors. Monitor server logs for suspicious activity related to behavior configuration changes or command execution attempts. Employ network segmentation and host-based intrusion detection systems to detect and prevent lateral movement in case of compromise. Regularly back up critical data and test incident response plans to minimize downtime and data loss in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.824Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a408f4b57a58fa16e1631
Added to database: 2/9/2026, 8:16:15 PM
Last enriched: 2/17/2026, 9:45:53 AM
Last updated: 3/27/2026, 1:16:41 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.