Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27126: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms

0
Medium
VulnerabilityCVE-2026-27126cvecve-2026-27126cwe-79
Published: Tue Feb 24 2026 (02/24/2026, 02:30:04 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, a stored Cross-site Scripting (XSS) vulnerability exists in the `editableTable.twig` component when using the `html` column type. The application fails to sanitize the input, allowing an attacker to execute arbitrary JavaScript when another user views a page with the malicious table field. In order to exploit the vulnerability, an attacker must have an administrator account, and `allowAdminChanges` must be enabled in production, which is against Craft's security recommendations. Versions 4.16.19 and 5.8.23 patch the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:56:28 UTC

Technical Analysis

Craft CMS, a popular content management system, suffers from a stored Cross-site Scripting (XSS) vulnerability identified as CVE-2026-27126. This vulnerability affects versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22. The flaw resides in the editableTable.twig component when the html column type is used. Specifically, the application fails to properly sanitize or neutralize input before rendering it on web pages, allowing malicious JavaScript code to be stored and later executed in the browsers of users who view the affected table field. Exploitation requires the attacker to have an administrator-level account and the configuration setting allowAdminChanges enabled in production environments, which is contrary to Craft CMS’s security recommendations. This limits the attack surface but does not eliminate risk, especially in environments where these conditions are met. The vulnerability can lead to session hijacking, credential theft, or other malicious actions performed in the context of the victim’s browser session. The vulnerability was assigned a CVSS 4.0 score of 5.9, indicating a medium severity level, with network attack vector, low attack complexity, partial privileges, and required user interaction. The issue was patched in versions 4.16.19 and 5.8.23, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is the potential execution of arbitrary JavaScript code in the browsers of users who view the compromised table field, which can lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim. Since exploitation requires administrator privileges and a specific configuration setting enabled in production, the risk is somewhat mitigated but remains significant in environments that do not follow recommended security practices. Organizations using affected versions of Craft CMS with allowAdminChanges enabled in production are at risk of internal threats or compromised administrator accounts being leveraged to inject malicious scripts. This can undermine the confidentiality and integrity of data managed within the CMS and potentially affect the availability of services if further attacks are chained. The vulnerability could also damage organizational reputation if exploited to deface websites or distribute malware to site visitors.

Mitigation Recommendations

1. Upgrade Craft CMS to version 4.16.19 or later, or 5.8.23 or later, where the vulnerability is patched. 2. Disable the allowAdminChanges setting in production environments as recommended by Craft CMS security guidelines to reduce the attack surface. 3. Enforce strict administrator account management, including strong authentication, least privilege principles, and regular auditing of admin activities. 4. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 5. Regularly review and sanitize all user-generated content, especially when using components like editableTable.twig with html column types. 6. Monitor logs and CMS activity for unusual behavior indicative of attempted exploitation. 7. Educate administrators about the risks of enabling development features in production and the importance of applying security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699d14d6be58cf853b182c33

Added to database: 2/24/2026, 3:02:46 AM

Last enriched: 3/4/2026, 1:56:28 AM

Last updated: 4/10/2026, 1:01:53 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses