CVE-2026-27127: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in craftcms cms
Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-Use (TOCTOU) vulnerability enables DNS rebinding attacks, where an attacker’s DNS server returns different IP addresses for validation compared to the actual request. This is a bypass of the security fix for CVE-2025-68437 that allows access to all blocked IPs, not just IPv6 endpoints. Exploitation requires GraphQL schema permissions for editing assets in the `<VolumeName>` volume and creating assets in the `<VolumeName>` volume. These permissions may be granted to authenticated users with appropriate GraphQL schema access and/or Public Schema (if misconfigured with write permissions). Versions 4.16.19 and 5.8.23 patch the issue.
AI Analysis
Technical Summary
Craft CMS, a widely used content management system, suffers from a TOCTOU race condition vulnerability (CVE-2026-27127) in its GraphQL Asset mutation SSRF validation mechanism. Specifically, the system performs DNS resolution separately from the subsequent HTTP request, creating a window where an attacker-controlled DNS server can return different IP addresses during validation and request phases. This discrepancy enables DNS rebinding attacks, effectively bypassing the SSRF protections implemented to block access to certain IP ranges, including internal and blocked IPs. This vulnerability is a regression or bypass of the earlier fix for CVE-2025-68437, extending the bypass to all blocked IPs rather than just IPv6 endpoints. To exploit this flaw, an attacker must have GraphQL schema permissions that allow editing or creating assets within a specified volume. These permissions may be granted to authenticated users or, in cases of misconfiguration, to public schemas with write access. The vulnerability affects Craft CMS versions from 4.5.0-RC1 up to but not including 4.16.19, and from 5.0.0-RC1 up to but not including 5.8.23, where patches have been applied. The CVSS 4.0 vector indicates network attack vector, high complexity, partial privileges required, no user interaction, and high impact on confidentiality, with no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability allows attackers with specific GraphQL permissions to bypass SSRF protections and access internal or otherwise blocked IP addresses, potentially exposing sensitive internal services, metadata endpoints, or administrative interfaces not intended for external access. The ability to perform DNS rebinding attacks can lead to unauthorized data disclosure, reconnaissance, and potentially lateral movement within an organization's internal network. Since exploitation requires authenticated access with asset editing or creation permissions, the risk is elevated in environments where such permissions are granted broadly or where public schemas are misconfigured to allow write access. Organizations using affected Craft CMS versions may face confidentiality breaches, especially if internal services contain sensitive information or control interfaces. The vulnerability does not directly impact data integrity or availability but can be a stepping stone for further attacks. The high CVSS score reflects the significant confidentiality impact and the complexity of exploitation, which requires some privileges but no user interaction.
Mitigation Recommendations
Organizations should immediately upgrade Craft CMS installations to versions 4.16.19 or 5.8.23 or later, where the vulnerability is patched. Review and tighten GraphQL schema permissions to ensure that only trusted, authenticated users have asset editing or creation rights, and avoid granting write permissions to public schemas. Implement strict network segmentation and firewall rules to limit access to internal services from the CMS server. Monitor GraphQL API usage for unusual asset mutation requests, especially from less trusted users. Consider deploying DNS security measures such as DNS filtering or DNSSEC validation to reduce the risk of DNS rebinding attacks. Additionally, conduct regular audits of CMS configurations and permissions to detect and remediate misconfigurations that could facilitate exploitation. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules targeting SSRF and DNS rebinding patterns to provide additional defense layers.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Brazil
CVE-2026-27127: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in craftcms cms
Description
Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-Use (TOCTOU) vulnerability enables DNS rebinding attacks, where an attacker’s DNS server returns different IP addresses for validation compared to the actual request. This is a bypass of the security fix for CVE-2025-68437 that allows access to all blocked IPs, not just IPv6 endpoints. Exploitation requires GraphQL schema permissions for editing assets in the `<VolumeName>` volume and creating assets in the `<VolumeName>` volume. These permissions may be granted to authenticated users with appropriate GraphQL schema access and/or Public Schema (if misconfigured with write permissions). Versions 4.16.19 and 5.8.23 patch the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Craft CMS, a widely used content management system, suffers from a TOCTOU race condition vulnerability (CVE-2026-27127) in its GraphQL Asset mutation SSRF validation mechanism. Specifically, the system performs DNS resolution separately from the subsequent HTTP request, creating a window where an attacker-controlled DNS server can return different IP addresses during validation and request phases. This discrepancy enables DNS rebinding attacks, effectively bypassing the SSRF protections implemented to block access to certain IP ranges, including internal and blocked IPs. This vulnerability is a regression or bypass of the earlier fix for CVE-2025-68437, extending the bypass to all blocked IPs rather than just IPv6 endpoints. To exploit this flaw, an attacker must have GraphQL schema permissions that allow editing or creating assets within a specified volume. These permissions may be granted to authenticated users or, in cases of misconfiguration, to public schemas with write access. The vulnerability affects Craft CMS versions from 4.5.0-RC1 up to but not including 4.16.19, and from 5.0.0-RC1 up to but not including 5.8.23, where patches have been applied. The CVSS 4.0 vector indicates network attack vector, high complexity, partial privileges required, no user interaction, and high impact on confidentiality, with no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
This vulnerability allows attackers with specific GraphQL permissions to bypass SSRF protections and access internal or otherwise blocked IP addresses, potentially exposing sensitive internal services, metadata endpoints, or administrative interfaces not intended for external access. The ability to perform DNS rebinding attacks can lead to unauthorized data disclosure, reconnaissance, and potentially lateral movement within an organization's internal network. Since exploitation requires authenticated access with asset editing or creation permissions, the risk is elevated in environments where such permissions are granted broadly or where public schemas are misconfigured to allow write access. Organizations using affected Craft CMS versions may face confidentiality breaches, especially if internal services contain sensitive information or control interfaces. The vulnerability does not directly impact data integrity or availability but can be a stepping stone for further attacks. The high CVSS score reflects the significant confidentiality impact and the complexity of exploitation, which requires some privileges but no user interaction.
Mitigation Recommendations
Organizations should immediately upgrade Craft CMS installations to versions 4.16.19 or 5.8.23 or later, where the vulnerability is patched. Review and tighten GraphQL schema permissions to ensure that only trusted, authenticated users have asset editing or creation rights, and avoid granting write permissions to public schemas. Implement strict network segmentation and firewall rules to limit access to internal services from the CMS server. Monitor GraphQL API usage for unusual asset mutation requests, especially from less trusted users. Consider deploying DNS security measures such as DNS filtering or DNSSEC validation to reduce the risk of DNS rebinding attacks. Additionally, conduct regular audits of CMS configurations and permissions to detect and remediate misconfigurations that could facilitate exploitation. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules targeting SSRF and DNS rebinding patterns to provide additional defense layers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T18:42:27.043Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699d14d6be58cf853b182c37
Added to database: 2/24/2026, 3:02:46 AM
Last enriched: 3/3/2026, 6:46:01 PM
Last updated: 4/9/2026, 11:07:14 PM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.