Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33162: CWE-285: Improper Authorization in craftcms cms

0
Medium
VulnerabilityCVE-2026-33162cvecve-2026-33162cwe-285cwe-862
Published: Tue Mar 24 2026 (03/24/2026, 17:32:27 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: cms

Description

CVE-2026-33162 is an improper authorization vulnerability in Craft CMS versions 5. 3. 0 through 5. 9. 13. Authenticated control panel users with only the accessCp permission can move entries between sections via a POST request, even without having the required saveEntries permission for the source or destination sections. This flaw allows unauthorized modification of content organization within the CMS. The vulnerability has been patched in version 5. 9. 14.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:22:39 UTC

Technical Analysis

Craft CMS is a widely used content management system that controls website content through sections and entries. Between versions 5.3.0 and before 5.9.14, a vulnerability identified as CVE-2026-33162 allows an authenticated user with minimal control panel access (accessCp permission) to move entries across different sections without possessing the necessary saveEntries permissions for either the source or destination sections. This improper authorization issue arises from insufficient permission checks on the POST /actions/entries/move-to-section endpoint. Normally, moving entries between sections should require explicit saveEntries permissions to prevent unauthorized content manipulation. However, due to this flaw, users can reorganize content arbitrarily, potentially disrupting site structure, content integrity, and editorial workflows. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The issue was addressed and patched in Craft CMS version 5.9.14. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required at a low level, with high impact on integrity but no impact on confidentiality or availability.

Potential Impact

The vulnerability allows unauthorized modification of content organization within Craft CMS installations, which can lead to several adverse effects. Attackers with minimal authenticated access can disrupt website content structure by moving entries between sections without proper authorization, potentially causing confusion, misinformation, or loss of editorial control. This can degrade the integrity of published content, damage brand reputation, and impair user trust. In environments where content sections correspond to different access levels or content types, unauthorized moves could expose sensitive content or violate compliance requirements. Although the vulnerability does not directly expose confidential data or cause denial of service, the integrity impact can be significant for organizations relying heavily on Craft CMS for content management. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but the ease of exploitation and lack of additional user interaction increase risk. Organizations with multiple editors or third-party contributors are particularly vulnerable to misuse or abuse of this flaw.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Craft CMS to version 5.9.14 or later, where the authorization checks have been properly enforced. Until upgrading is possible, administrators should restrict control panel access strictly to trusted users and review user permissions to minimize the number of users with accessCp rights. Implementing multi-factor authentication (MFA) for control panel access can reduce the risk of account compromise. Monitoring and auditing content changes, especially moves between sections, can help detect unauthorized activity early. Additionally, consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests to /actions/entries/move-to-section. Regularly reviewing and tightening CMS user roles and permissions will also reduce the attack surface. Finally, educating content editors and administrators about the risk and signs of exploitation can improve organizational readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2cdd9f4197a8e3b58a8ca

Added to database: 3/24/2026, 5:46:01 PM

Last enriched: 3/31/2026, 8:22:39 PM

Last updated: 5/7/2026, 4:25:22 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses