Skip to content

Stored XSS in Revision Context Menu

Moderate
angrybrad published GHSA-3x4w-mxpf-fhqq Mar 16, 2026

Package

composer craftcms/cms (Composer)

Affected versions

>= 5.9.0-beta.1, <= 5.9.10

Patched versions

5.9.11

Description

The revision/draft context menu in the element editor renders the creator’s fullName as raw HTML due to the
use of Template::raw() combined with Craft::t() string interpolation. A low-privileged control panel user
(e.g., Author) can set their fullName to an XSS payload via the profile editor, then create an entry with two
saves.

If an administrator is logged in and executes a specifically crafted payload while an elevated session is active, the attacker’s account can be elevated to administrator.

Users should update to Craft 5.9.11 with the patch to mitigate the issue.

References

f634a9d

Severity

Moderate

CVE ID

CVE-2026-33051

Weaknesses

No CWEs

Credits