CVE-2026-32268: CWE-862: Missing Authorization in craftcms azure-blob
The Azure Blob Storage for Craft CMS plugin provides an Azure Blob Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.1.1, unauthenticated users can view a list of buckets the plugin has access to. The `DefaultController->actionLoadContainerData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Because Azure can return sensitive data in error messages, additional attack vectors are also exposed. Users should update to version 2.1.1 of the plugin to mitigate the issue.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-32268 affects the Azure Blob Storage plugin for Craft CMS, specifically versions from 2.0.0-beta.1 up to 2.1.1. The core issue is a missing authorization check (CWE-862) in the DefaultController->actionLoadContainerData() endpoint, which allows unauthenticated users who have a valid CSRF token to enumerate Azure Blob Storage buckets that the plugin can access. This endpoint does not properly verify the user's authorization before disclosing the list of storage containers. Additionally, Azure Blob Storage may return sensitive information within error messages, which could be leveraged by attackers to gain further insights or craft additional attack vectors. The vulnerability requires no authentication or user interaction beyond possessing a valid CSRF token, which may be obtainable through other means or social engineering. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and a high impact on confidentiality. While no exploits have been reported in the wild, the exposure of bucket names and potentially sensitive error data could facilitate reconnaissance and subsequent attacks on cloud storage assets. The recommended mitigation is to upgrade the plugin to version 2.1.1, where proper authorization checks have been implemented to restrict access to authorized users only.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Azure Blob Storage bucket names and potentially sensitive information contained in error messages. This can lead to significant confidentiality breaches, as attackers can gain insight into the cloud storage architecture and potentially identify targets for further exploitation, such as data exfiltration or privilege escalation. Since the vulnerability requires no authentication and minimal user interaction, it lowers the barrier for attackers to perform reconnaissance. Organizations using Craft CMS with the affected Azure Blob Storage plugin versions risk exposure of sensitive cloud storage resources, which could undermine data security and compliance requirements. Additionally, knowledge of bucket names can assist attackers in crafting more targeted attacks, including phishing or exploiting other misconfigurations. Although availability and integrity impacts are not directly indicated, the information disclosure alone can have severe consequences for organizations relying on Azure Blob Storage for critical data storage.
Mitigation Recommendations
1. Immediately update the Azure Blob Storage plugin for Craft CMS to version 2.1.1 or later, where the authorization checks have been properly implemented. 2. Review and restrict access to the DefaultController->actionLoadContainerData() endpoint to authenticated and authorized users only. 3. Implement strict validation and sanitization of error messages returned by Azure Blob Storage to avoid leaking sensitive information. 4. Monitor web application logs for unusual access patterns to the vulnerable endpoint, especially requests with valid CSRF tokens but no authentication. 5. Employ Web Application Firewalls (WAFs) to detect and block unauthorized attempts to access sensitive plugin endpoints. 6. Conduct regular security audits of third-party plugins and their integration points with cloud services to identify missing authorization or authentication controls. 7. Educate developers and administrators about the risks of missing authorization and the importance of secure coding practices, especially when integrating with cloud services.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-32268: CWE-862: Missing Authorization in craftcms azure-blob
Description
The Azure Blob Storage for Craft CMS plugin provides an Azure Blob Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.1.1, unauthenticated users can view a list of buckets the plugin has access to. The `DefaultController->actionLoadContainerData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Because Azure can return sensitive data in error messages, additional attack vectors are also exposed. Users should update to version 2.1.1 of the plugin to mitigate the issue.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-32268 affects the Azure Blob Storage plugin for Craft CMS, specifically versions from 2.0.0-beta.1 up to 2.1.1. The core issue is a missing authorization check (CWE-862) in the DefaultController->actionLoadContainerData() endpoint, which allows unauthenticated users who have a valid CSRF token to enumerate Azure Blob Storage buckets that the plugin can access. This endpoint does not properly verify the user's authorization before disclosing the list of storage containers. Additionally, Azure Blob Storage may return sensitive information within error messages, which could be leveraged by attackers to gain further insights or craft additional attack vectors. The vulnerability requires no authentication or user interaction beyond possessing a valid CSRF token, which may be obtainable through other means or social engineering. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and a high impact on confidentiality. While no exploits have been reported in the wild, the exposure of bucket names and potentially sensitive error data could facilitate reconnaissance and subsequent attacks on cloud storage assets. The recommended mitigation is to upgrade the plugin to version 2.1.1, where proper authorization checks have been implemented to restrict access to authorized users only.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of Azure Blob Storage bucket names and potentially sensitive information contained in error messages. This can lead to significant confidentiality breaches, as attackers can gain insight into the cloud storage architecture and potentially identify targets for further exploitation, such as data exfiltration or privilege escalation. Since the vulnerability requires no authentication and minimal user interaction, it lowers the barrier for attackers to perform reconnaissance. Organizations using Craft CMS with the affected Azure Blob Storage plugin versions risk exposure of sensitive cloud storage resources, which could undermine data security and compliance requirements. Additionally, knowledge of bucket names can assist attackers in crafting more targeted attacks, including phishing or exploiting other misconfigurations. Although availability and integrity impacts are not directly indicated, the information disclosure alone can have severe consequences for organizations relying on Azure Blob Storage for critical data storage.
Mitigation Recommendations
1. Immediately update the Azure Blob Storage plugin for Craft CMS to version 2.1.1 or later, where the authorization checks have been properly implemented. 2. Review and restrict access to the DefaultController->actionLoadContainerData() endpoint to authenticated and authorized users only. 3. Implement strict validation and sanitization of error messages returned by Azure Blob Storage to avoid leaking sensitive information. 4. Monitor web application logs for unusual access patterns to the vulnerable endpoint, especially requests with valid CSRF tokens but no authentication. 5. Employ Web Application Firewalls (WAFs) to detect and block unauthorized attempts to access sensitive plugin endpoints. 6. Conduct regular security audits of third-party plugins and their integration points with cloud services to identify missing authorization or authentication controls. 7. Educate developers and administrators about the risks of missing authorization and the importance of secure coding practices, especially when integrating with cloud services.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T15:05:48.398Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bae0bb771bdb1749b563e3
Added to database: 3/18/2026, 5:28:27 PM
Last enriched: 3/18/2026, 5:42:47 PM
Last updated: 3/18/2026, 7:16:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.