CVE-2026-33051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms
CVE-2026-33051 is a medium-severity cross-site scripting (XSS) vulnerability in Craft CMS versions 5. 9. 0-beta. 1 through 5. 9. 10. It arises because the revision/draft context menu renders a user’s fullName as raw HTML without proper sanitization, allowing a low-privileged user to inject malicious scripts. By setting their fullName to an XSS payload and creating an entry with two saves, an attacker can execute code in the context of an administrator’s session. This can lead to privilege escalation, allowing the attacker’s account to be elevated to administrator. The vulnerability requires no user interaction from the administrator but does require the attacker to have low-level access to the control panel.
AI Analysis
Technical Summary
CVE-2026-33051 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Craft CMS, a popular content management system. The flaw exists in versions 5.9.0-beta.1 through 5.9.10 within the revision/draft context menu of the element editor. Specifically, the vulnerability stems from the use of Template::raw() combined with Craft::t() string interpolation, which causes the creator’s fullName to be rendered as raw HTML without proper input neutralization. A low-privileged user, such as an Author, can exploit this by setting their fullName field to a malicious XSS payload via the profile editor. After creating an entry and saving it twice, the crafted payload is stored and later executed when an administrator views the revision/draft context menu. Because the administrator’s session is elevated, the attacker’s script runs with high privileges, enabling privilege escalation to administrator level. This attack vector does not require user interaction from the administrator beyond having an active session and viewing the affected interface. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. No known exploits in the wild have been reported as of the publication date. The issue was resolved in Craft CMS version 5.9.11 by properly sanitizing the fullName output to prevent raw HTML injection.
Potential Impact
This vulnerability allows an attacker with low-level access (e.g., an Author role) to escalate privileges to administrator by exploiting an XSS flaw in the CMS interface. The impact includes unauthorized administrative control over the CMS, which can lead to full site compromise, data theft, content manipulation, and deployment of further malicious payloads. Organizations relying on Craft CMS for website management risk defacement, data breaches, and disruption of services. Since the attack requires an administrator to have an active session and view the affected UI, the scope is somewhat limited but still significant in environments with multiple users and roles. The ability to escalate privileges without administrator interaction beyond viewing the interface increases the risk of stealthy compromise. The medium CVSS score reflects a moderate risk but the potential for full administrative takeover elevates the criticality of timely remediation.
Mitigation Recommendations
Organizations should immediately upgrade Craft CMS to version 5.9.11 or later, where the vulnerability is fixed. Until the upgrade can be performed, restrict the ability of low-privileged users to modify their fullName fields or limit access to the element editor’s revision/draft context menu. Implement strict input validation and output encoding on all user-supplied data, especially fields rendered in administrative interfaces. Monitor administrative sessions and audit logs for unusual activity that may indicate exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the fullName field. Educate administrators to avoid leaving sessions open unnecessarily and to log out when not actively managing the CMS. Regularly review user roles and permissions to minimize the number of users with access to sensitive CMS features. Finally, conduct penetration testing focused on user input handling and privilege escalation vectors within the CMS environment.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-33051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms
Description
CVE-2026-33051 is a medium-severity cross-site scripting (XSS) vulnerability in Craft CMS versions 5. 9. 0-beta. 1 through 5. 9. 10. It arises because the revision/draft context menu renders a user’s fullName as raw HTML without proper sanitization, allowing a low-privileged user to inject malicious scripts. By setting their fullName to an XSS payload and creating an entry with two saves, an attacker can execute code in the context of an administrator’s session. This can lead to privilege escalation, allowing the attacker’s account to be elevated to administrator. The vulnerability requires no user interaction from the administrator but does require the attacker to have low-level access to the control panel.
AI-Powered Analysis
Technical Analysis
CVE-2026-33051 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Craft CMS, a popular content management system. The flaw exists in versions 5.9.0-beta.1 through 5.9.10 within the revision/draft context menu of the element editor. Specifically, the vulnerability stems from the use of Template::raw() combined with Craft::t() string interpolation, which causes the creator’s fullName to be rendered as raw HTML without proper input neutralization. A low-privileged user, such as an Author, can exploit this by setting their fullName field to a malicious XSS payload via the profile editor. After creating an entry and saving it twice, the crafted payload is stored and later executed when an administrator views the revision/draft context menu. Because the administrator’s session is elevated, the attacker’s script runs with high privileges, enabling privilege escalation to administrator level. This attack vector does not require user interaction from the administrator beyond having an active session and viewing the affected interface. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. No known exploits in the wild have been reported as of the publication date. The issue was resolved in Craft CMS version 5.9.11 by properly sanitizing the fullName output to prevent raw HTML injection.
Potential Impact
This vulnerability allows an attacker with low-level access (e.g., an Author role) to escalate privileges to administrator by exploiting an XSS flaw in the CMS interface. The impact includes unauthorized administrative control over the CMS, which can lead to full site compromise, data theft, content manipulation, and deployment of further malicious payloads. Organizations relying on Craft CMS for website management risk defacement, data breaches, and disruption of services. Since the attack requires an administrator to have an active session and view the affected UI, the scope is somewhat limited but still significant in environments with multiple users and roles. The ability to escalate privileges without administrator interaction beyond viewing the interface increases the risk of stealthy compromise. The medium CVSS score reflects a moderate risk but the potential for full administrative takeover elevates the criticality of timely remediation.
Mitigation Recommendations
Organizations should immediately upgrade Craft CMS to version 5.9.11 or later, where the vulnerability is fixed. Until the upgrade can be performed, restrict the ability of low-privileged users to modify their fullName fields or limit access to the element editor’s revision/draft context menu. Implement strict input validation and output encoding on all user-supplied data, especially fields rendered in administrative interfaces. Monitor administrative sessions and audit logs for unusual activity that may indicate exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the fullName field. Educate administrators to avoid leaving sessions open unnecessarily and to log out when not actively managing the CMS. Regularly review user roles and permissions to minimize the number of users with access to sensitive CMS features. Finally, conduct penetration testing focused on user input handling and privilege escalation vectors within the CMS environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T18:10:50.212Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bce490e32a4fbe5f3388a9
Added to database: 3/20/2026, 6:09:20 AM
Last enriched: 3/20/2026, 6:24:39 AM
Last updated: 3/20/2026, 7:23:27 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.