CVE-2026-33162: CWE-285: Improper Authorization in craftcms cms
CVE-2026-33162 is an improper authorization vulnerability in Craft CMS versions 5. 3. 0 through 5. 9. 13. Authenticated control panel users with only the accessCp permission can move entries between sections via a POST request, even without having the required saveEntries permission for the source or destination sections. This flaw allows unauthorized modification of content organization within the CMS. The vulnerability has been patched in version 5. 9. 14.
AI Analysis
Technical Summary
Craft CMS is a widely used content management system that controls website content through sections and entries. Between versions 5.3.0 and before 5.9.14, a vulnerability identified as CVE-2026-33162 allows an authenticated user with minimal control panel access (accessCp permission) to move entries across different sections without possessing the necessary saveEntries permissions for either the source or destination sections. This improper authorization issue arises from insufficient permission checks on the POST /actions/entries/move-to-section endpoint. Normally, moving entries between sections should require explicit saveEntries permissions to prevent unauthorized content manipulation. However, due to this flaw, users can reorganize content arbitrarily, potentially disrupting site structure, content integrity, and editorial workflows. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The issue was addressed and patched in Craft CMS version 5.9.14. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required at a low level, with high impact on integrity but no impact on confidentiality or availability.
Potential Impact
The vulnerability allows unauthorized modification of content organization within Craft CMS installations, which can lead to several adverse effects. Attackers with minimal authenticated access can disrupt website content structure by moving entries between sections without proper authorization, potentially causing confusion, misinformation, or loss of editorial control. This can degrade the integrity of published content, damage brand reputation, and impair user trust. In environments where content sections correspond to different access levels or content types, unauthorized moves could expose sensitive content or violate compliance requirements. Although the vulnerability does not directly expose confidential data or cause denial of service, the integrity impact can be significant for organizations relying heavily on Craft CMS for content management. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but the ease of exploitation and lack of additional user interaction increase risk. Organizations with multiple editors or third-party contributors are particularly vulnerable to misuse or abuse of this flaw.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Craft CMS to version 5.9.14 or later, where the authorization checks have been properly enforced. Until upgrading is possible, administrators should restrict control panel access strictly to trusted users and review user permissions to minimize the number of users with accessCp rights. Implementing multi-factor authentication (MFA) for control panel access can reduce the risk of account compromise. Monitoring and auditing content changes, especially moves between sections, can help detect unauthorized activity early. Additionally, consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests to /actions/entries/move-to-section. Regularly reviewing and tightening CMS user roles and permissions will also reduce the attack surface. Finally, educating content editors and administrators about the risk and signs of exploitation can improve organizational readiness.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Brazil
CVE-2026-33162: CWE-285: Improper Authorization in craftcms cms
Description
CVE-2026-33162 is an improper authorization vulnerability in Craft CMS versions 5. 3. 0 through 5. 9. 13. Authenticated control panel users with only the accessCp permission can move entries between sections via a POST request, even without having the required saveEntries permission for the source or destination sections. This flaw allows unauthorized modification of content organization within the CMS. The vulnerability has been patched in version 5. 9. 14.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Craft CMS is a widely used content management system that controls website content through sections and entries. Between versions 5.3.0 and before 5.9.14, a vulnerability identified as CVE-2026-33162 allows an authenticated user with minimal control panel access (accessCp permission) to move entries across different sections without possessing the necessary saveEntries permissions for either the source or destination sections. This improper authorization issue arises from insufficient permission checks on the POST /actions/entries/move-to-section endpoint. Normally, moving entries between sections should require explicit saveEntries permissions to prevent unauthorized content manipulation. However, due to this flaw, users can reorganize content arbitrarily, potentially disrupting site structure, content integrity, and editorial workflows. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The issue was addressed and patched in Craft CMS version 5.9.14. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and privileges required at a low level, with high impact on integrity but no impact on confidentiality or availability.
Potential Impact
The vulnerability allows unauthorized modification of content organization within Craft CMS installations, which can lead to several adverse effects. Attackers with minimal authenticated access can disrupt website content structure by moving entries between sections without proper authorization, potentially causing confusion, misinformation, or loss of editorial control. This can degrade the integrity of published content, damage brand reputation, and impair user trust. In environments where content sections correspond to different access levels or content types, unauthorized moves could expose sensitive content or violate compliance requirements. Although the vulnerability does not directly expose confidential data or cause denial of service, the integrity impact can be significant for organizations relying heavily on Craft CMS for content management. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but the ease of exploitation and lack of additional user interaction increase risk. Organizations with multiple editors or third-party contributors are particularly vulnerable to misuse or abuse of this flaw.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Craft CMS to version 5.9.14 or later, where the authorization checks have been properly enforced. Until upgrading is possible, administrators should restrict control panel access strictly to trusted users and review user permissions to minimize the number of users with accessCp rights. Implementing multi-factor authentication (MFA) for control panel access can reduce the risk of account compromise. Monitoring and auditing content changes, especially moves between sections, can help detect unauthorized activity early. Additionally, consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests to /actions/entries/move-to-section. Regularly reviewing and tightening CMS user roles and permissions will also reduce the attack surface. Finally, educating content editors and administrators about the risk and signs of exploitation can improve organizational readiness.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T21:17:08.887Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c2cdd9f4197a8e3b58a8ca
Added to database: 3/24/2026, 5:46:01 PM
Last enriched: 3/31/2026, 8:22:39 PM
Last updated: 5/7/2026, 4:25:22 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.