CraftCMS has an RCE vulnerability via relational conditionals in the control panel
Package
Affected versions
>= 5.0.0-RC1, <= 5.9.8
>= 4.0.0-beta.1, <= 4.17.3
Patched versions
5.9.9
4.17.4
Description
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Published by the National Vulnerability Database
Mar 11, 2026
Last updated
Mar 11, 2026
A Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system.
The
BaseElementSelectConditionRule::getElementIds()method passes user-controlled string inputthrough
renderObjectTemplate()-- an unsandboxed Twig rendering function with escaping disabled.Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full
RCE by sending a crafted condition rule via standard element listing endpoints.
This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and
bypasses all production hardening settings (allowAdminChanges: false, devMode: false,
enableTwigSandbox: true).
Users should update to the patched 5.99 release to mitigate the issue.
References