Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms cms

0
Medium
VulnerabilityCVE-2026-33051cvecve-2026-33051cwe-79
Published: Fri Mar 20 2026 (03/20/2026, 05:56:02 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

CVE-2026-33051 is a medium-severity cross-site scripting (XSS) vulnerability in Craft CMS versions 5. 9. 0-beta. 1 through 5. 9. 10. It arises because the revision/draft context menu renders a user’s fullName as raw HTML without proper sanitization, allowing a low-privileged user to inject malicious scripts. By setting their fullName to an XSS payload and creating an entry with two saves, an attacker can execute code in the context of an administrator’s session. This can lead to privilege escalation, allowing the attacker’s account to be elevated to administrator. The vulnerability requires no user interaction from the administrator but does require the attacker to have low-level access to the control panel.

AI-Powered Analysis

AILast updated: 03/20/2026, 06:24:39 UTC

Technical Analysis

CVE-2026-33051 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Craft CMS, a popular content management system. The flaw exists in versions 5.9.0-beta.1 through 5.9.10 within the revision/draft context menu of the element editor. Specifically, the vulnerability stems from the use of Template::raw() combined with Craft::t() string interpolation, which causes the creator’s fullName to be rendered as raw HTML without proper input neutralization. A low-privileged user, such as an Author, can exploit this by setting their fullName field to a malicious XSS payload via the profile editor. After creating an entry and saving it twice, the crafted payload is stored and later executed when an administrator views the revision/draft context menu. Because the administrator’s session is elevated, the attacker’s script runs with high privileges, enabling privilege escalation to administrator level. This attack vector does not require user interaction from the administrator beyond having an active session and viewing the affected interface. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. No known exploits in the wild have been reported as of the publication date. The issue was resolved in Craft CMS version 5.9.11 by properly sanitizing the fullName output to prevent raw HTML injection.

Potential Impact

This vulnerability allows an attacker with low-level access (e.g., an Author role) to escalate privileges to administrator by exploiting an XSS flaw in the CMS interface. The impact includes unauthorized administrative control over the CMS, which can lead to full site compromise, data theft, content manipulation, and deployment of further malicious payloads. Organizations relying on Craft CMS for website management risk defacement, data breaches, and disruption of services. Since the attack requires an administrator to have an active session and view the affected UI, the scope is somewhat limited but still significant in environments with multiple users and roles. The ability to escalate privileges without administrator interaction beyond viewing the interface increases the risk of stealthy compromise. The medium CVSS score reflects a moderate risk but the potential for full administrative takeover elevates the criticality of timely remediation.

Mitigation Recommendations

Organizations should immediately upgrade Craft CMS to version 5.9.11 or later, where the vulnerability is fixed. Until the upgrade can be performed, restrict the ability of low-privileged users to modify their fullName fields or limit access to the element editor’s revision/draft context menu. Implement strict input validation and output encoding on all user-supplied data, especially fields rendered in administrative interfaces. Monitor administrative sessions and audit logs for unusual activity that may indicate exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the fullName field. Educate administrators to avoid leaving sessions open unnecessarily and to log out when not actively managing the CMS. Regularly review user roles and permissions to minimize the number of users with access to sensitive CMS features. Finally, conduct penetration testing focused on user input handling and privilege escalation vectors within the CMS environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.212Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bce490e32a4fbe5f3388a9

Added to database: 3/20/2026, 6:09:20 AM

Last enriched: 3/20/2026, 6:24:39 AM

Last updated: 3/20/2026, 7:23:27 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses