Skip to content

Race condition in Token Service potentially allows for token usage greater than the token limit

Moderate
angrybrad published GHSA-6fx5-5cw5-4897 Feb 23, 2026

Package

composer craftcms/cms (Composer)

Affected versions

>= 4.5.0-RC1, <= 4.16.18
>= 5.0.0-RC1, <= 5.8.22

Patched versions

4.16.19
5.8.23

Description

A Time-of-Check-Time-of-Use (TOCTOU) race condition exists in Craft CMS’s token validation service for tokens that explicitly set a limited usage. The getTokenRoute() method reads a token’s usage count, checks if it’s within limits, then updates the database in separate non-atomic operations. By sending concurrent requests, an attacker can use a single-use impersonation token multiple times before the database update completes.

To make this work, you need to obtain a valid user account impersonation URL with a non-expired token via some other means and exploit a race condition while bypassing any rate-limiting rules in place.

For this to be a privilege escalation, the impersonation URL must include a token for a user account with more permissions than your current user.

References

3e4afe1

Severity

Moderate

CVE ID

CVE-2026-27128

Weaknesses

Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. Learn more on MITRE.

Credits