Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29172: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in craftcms commerce

0
High
VulnerabilityCVE-2026-29172cvecve-2026-29172cwe-89
Published: Tue Mar 10 2026 (03/10/2026, 19:52:32 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: commerce

Description

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, Craft Commerce is vulnerable to SQL Injection in the purchasables table endpoint. The sort parameter is split by | and the first part (column name) is passed directly as an array key to orderBy() without whitelist validation. Yii2's query builder does NOT escape array keys, allowing an authenticated attacker to inject arbitrary SQL into the ORDER BY clause. This vulnerability is fixed in 4.10.2 and 5.5.3.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:29:52 UTC

Technical Analysis

Craft Commerce, an ecommerce platform built on Craft CMS, suffers from an SQL Injection vulnerability identified as CVE-2026-29172. The vulnerability arises in the purchasables table endpoint where the 'sort' parameter is parsed by splitting on the '|' character. The first segment, representing a column name, is directly used as an array key in Yii2's orderBy() query builder method without any whitelist validation. Yii2's query builder does not escape array keys, which allows an authenticated attacker to inject arbitrary SQL code into the ORDER BY clause of the SQL query. This improper neutralization of special elements (CWE-89) can be exploited to manipulate database queries, potentially exposing sensitive data, modifying data, or causing denial of service. The vulnerability affects Craft Commerce versions from 4.0.0 up to but not including 4.10.2, and from 5.0.0 up to but not including 5.5.3. The flaw requires the attacker to have authenticated access but does not require user interaction. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, no privileges required beyond authentication, and high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on March 10, 2026, and no known exploits have been reported in the wild. The vendor has addressed the vulnerability in versions 4.10.2 and 5.5.3 by implementing proper validation and escaping mechanisms.

Potential Impact

The SQL Injection vulnerability in Craft Commerce can have severe consequences for organizations using affected versions. An authenticated attacker can exploit this flaw to execute arbitrary SQL commands within the ORDER BY clause, potentially leading to unauthorized data disclosure, data manipulation, or deletion. This compromises the confidentiality, integrity, and availability of the ecommerce platform's backend database. Attackers might extract sensitive customer information, payment details, or order histories, leading to privacy violations and regulatory non-compliance. Additionally, malicious SQL commands could disrupt normal operations, causing denial of service or corrupting critical business data. Since Craft Commerce is used globally by online retailers, exploitation could result in significant financial losses, reputational damage, and legal liabilities. The requirement for authentication limits exposure somewhat but does not eliminate risk, especially if credentials are compromised or insider threats exist. The lack of user interaction needed makes automated exploitation feasible once credentials are obtained.

Mitigation Recommendations

To mitigate CVE-2026-29172, organizations should immediately upgrade Craft Commerce to versions 4.10.2 or 5.5.3 where the vulnerability is patched. If immediate upgrade is not possible, implement strict input validation and sanitization on the 'sort' parameter to enforce a whitelist of allowed column names before passing values to orderBy(). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the ORDER BY clause. Limit and monitor authenticated user privileges to reduce the risk of credential abuse. Conduct regular security audits and penetration testing focusing on injection flaws. Enable detailed logging and alerting on database query anomalies. Educate developers on secure coding practices, especially regarding dynamic query construction and the risks of unsanitized input. Finally, maintain an incident response plan to quickly address any suspected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T14:44:00.712Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b07bba2f860ef943b24cc0

Added to database: 3/10/2026, 8:14:50 PM

Last enriched: 3/10/2026, 8:29:52 PM

Last updated: 3/13/2026, 9:25:14 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses