Skip to content

Commit d906cc5

Browse files
1 parent 59df8ab commit d906cc5

8 files changed

Lines changed: 63 additions & 17 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-2xfc-g69j-x2mp/GHSA-2xfc-g69j-x2mp.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2xfc-g69j-x2mp",
4-
"modified": "2026-03-03T21:00:51Z",
4+
"modified": "2026-03-04T18:39:05Z",
55
"published": "2026-03-03T21:00:51Z",
66
"aliases": [
77
"CVE-2026-28781"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-2xfc-g69j-x2mp"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28781"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/commit/830b403870cd784b47ae42a3f5a16e7ac2d7f5a8"
@@ -80,6 +84,6 @@
8084
"severity": "MODERATE",
8185
"github_reviewed": true,
8286
"github_reviewed_at": "2026-03-03T21:00:51Z",
83-
"nvd_published_at": null
87+
"nvd_published_at": "2026-03-04T17:16:21Z"
8488
}
8589
}

advisories/github-reviewed/2026/03/GHSA-5fvc-7894-ghp4/GHSA-5fvc-7894-ghp4.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5fvc-7894-ghp4",
4-
"modified": "2026-03-03T21:01:27Z",
4+
"modified": "2026-03-04T18:39:13Z",
55
"published": "2026-03-03T21:01:27Z",
66
"aliases": [
77
"CVE-2026-28783"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-5fvc-7894-ghp4"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28783"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/pull/18208"
@@ -81,6 +85,6 @@
8185
"severity": "MODERATE",
8286
"github_reviewed": true,
8387
"github_reviewed_at": "2026-03-03T21:01:27Z",
84-
"nvd_published_at": null
88+
"nvd_published_at": "2026-03-04T17:16:21Z"
8589
}
8690
}

advisories/github-reviewed/2026/03/GHSA-7x43-mpfg-r9wj/GHSA-7x43-mpfg-r9wj.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7x43-mpfg-r9wj",
4-
"modified": "2026-03-03T20:38:55Z",
4+
"modified": "2026-03-04T18:38:55Z",
55
"published": "2026-03-03T20:38:55Z",
66
"aliases": [
77
"CVE-2026-28696"
88
],
99
"summary": "Craft CMS has IDOR via GraphQL @parseRefs",
1010
"details": "The GraphQL directive `@parseRefs`, intended to parse internal reference tags (e.g., `{user:1:email}`), can be abused by both authenticated users and unauthenticated guests (if a Public Schema is enabled) to access sensitive attributes of any element in the CMS. The implementation in `Elements::parseRefs` fails to perform authorization checks, allowing attackers to read data they are not authorized to view.\n\n## Vulnerability Details\n\n`craft\\services\\Elements::parseRefs` identifies reference tags and resolves them using `_getRefTokenReplacement`. This method fetches the referenced element and accesses the specified attribute via $element->$attribute.\n\n- Missing Auth Check: It bypasses `canView()` checks.\n- Polymorphic Access: `getElementTypeByRefHandle` allows referencing any element type (entry, asset, user, category).\n- Custom Field Access: Since Craft elements use `__get()` to resolve custom field handles, an attacker is not limited to core attributes. They can exfiltrate any custom field data by enumerating the field handle (e.g. `{entry:123:privateNotes}`).\n\n## Attack Vectors\n\n1. Privilege Escalation / User Data Leak\n\nAn attacker can enumerate sensitive attributes of administrators or other users.\n\n- Payload: `{user:1:email}` or `{user:1:photoId}`\n\n2. Arbitrary Property Reflection & Server-Side Logic Execution\n\nThe vulnerability allows reflecting any accessible property of the underlying Element model.\n\n- Username/Admin Enumeration: `{user:1:username}` (Confirmed: returns admin), {user:1:admin}.\n- Internal Path Disclosure: Accessing methods that trigger errors (e.g., `{user:1:authKey}`) exposes full server stack traces in the GraphQL error response (e.g., Exception: No user session token exists with paths like `/var/www/html/...`).\n\n3. IDOR on Private Entries & Assets (Polymorphism)\n\nThe vulnerability is not limited to Users. Reference tags can target any element type.\n\n- Payload: `{entry:456:myConfidentialField}` (Bypasses canView checks).\n- Asset Path Leakage: `{volume:1:path}` can expose internal file system paths.\n\n4. Unauthenticated Exploitation (Public Schema)\n\nConfirmed locally. The `@parseRefs` directive is active in the Public Schema. By injecting a payload into a public-facing field (e.g., a \"News\" entry title), an unauthenticated guest can trigger the resolution and retrieve the sensitive output.\n\n## Steps to Reproduce\n\n1. Setup (Admin Panel):\n- Create a Section (e.g., \"News\") and an Entry Type.\n- Create a new Entry in that section. Set the Title to the payload: {user:1:username} or {user:1:email}.\n- Go to GraphQL > Schemas > Public Schema. Enable it, and ensure \"Query for elements in the Site\" and \"News\" section queries are checked.\n\n2. Execute Exploit (Unauthenticated):\n- Send a POST request to http://localhost:8000/index.php?action=graphql/api:\n```\ncurl -X POST \\\n-H \"Content-Type: application/json\" \\\n-d '{\"query\": \"{ entries { title @parseRefs } }\"}'\n```\n\n3. Observation:\n- The API returns `{\"data\":{\"entries\":[{\"title\":\"admin\"}]}}` (or the email).\n- Using `{user:1:authKey}` triggers an internal server error that leaks the full server path in string format.\n\n## Impact\n\n- Critical Information Disclosure: Full PII enumeration (emails, usernames).\n- System Information Leakage: Absolute server paths via stack traces.\n- Authentication Bypass: Guest accounts can effectively query the database as the system user.\n\n## Recommended Fix\n\nModify `Elements::parseRefs` to enforce `canView` permissions on the resolved element before extracting attributes.\n\n## References\n\nhttps://github.com/craftcms/cms/commit/4d98a07e47580f1712095825d3e3c4d67bc9f8b9",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -54,6 +59,10 @@
5459
"type": "WEB",
5560
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-7x43-mpfg-r9wj"
5661
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28696"
65+
},
5766
{
5867
"type": "WEB",
5968
"url": "https://github.com/craftcms/cms/commit/4d98a07e47580f1712095825d3e3c4d67bc9f8b9"
@@ -65,11 +74,12 @@
6574
],
6675
"database_specific": {
6776
"cwe_ids": [
77+
"CWE-639",
6878
"CWE-862"
6979
],
7080
"severity": "HIGH",
7181
"github_reviewed": true,
7282
"github_reviewed_at": "2026-03-03T20:38:55Z",
73-
"nvd_published_at": null
83+
"nvd_published_at": "2026-03-04T17:16:21Z"
7484
}
7585
}

advisories/github-reviewed/2026/03/GHSA-94rc-cqvm-m4pw/GHSA-94rc-cqvm-m4pw.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-94rc-cqvm-m4pw",
4-
"modified": "2026-03-03T20:30:36Z",
4+
"modified": "2026-03-04T18:38:42Z",
55
"published": "2026-03-03T20:30:36Z",
66
"aliases": [
77
"CVE-2026-28695"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-94rc-cqvm-m4pw"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28695"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/commit/e31e50849ad71638e11ea55fbd1ed90ae8f8f6e0"
@@ -77,6 +81,6 @@
7781
"severity": "MODERATE",
7882
"github_reviewed": true,
7983
"github_reviewed_at": "2026-03-03T20:30:36Z",
80-
"nvd_published_at": null
84+
"nvd_published_at": "2026-03-04T17:16:20Z"
8185
}
8286
}

advisories/github-reviewed/2026/03/GHSA-jxm3-pmm2-9gf6/GHSA-jxm3-pmm2-9gf6.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jxm3-pmm2-9gf6",
4-
"modified": "2026-03-03T21:05:12Z",
4+
"modified": "2026-03-04T18:39:08Z",
55
"published": "2026-03-03T21:05:12Z",
66
"aliases": [
77
"CVE-2026-28782"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-jxm3-pmm2-9gf6"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28782"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/commit/fb61a91357f5761c852400185ba931f51d82783d"
@@ -75,6 +79,6 @@
7579
"severity": "MODERATE",
7680
"github_reviewed": true,
7781
"github_reviewed_at": "2026-03-03T21:05:12Z",
78-
"nvd_published_at": null
82+
"nvd_published_at": "2026-03-04T17:16:21Z"
7983
}
8084
}

advisories/github-reviewed/2026/03/GHSA-qc86-q28f-ggww/GHSA-qc86-q28f-ggww.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qc86-q28f-ggww",
4-
"modified": "2026-03-03T21:06:41Z",
4+
"modified": "2026-03-04T18:39:16Z",
55
"published": "2026-03-03T21:06:41Z",
66
"aliases": [
77
"CVE-2026-28784"
@@ -59,10 +59,18 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-qc86-q28f-ggww"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28784"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/pull/18208"
6569
},
70+
{
71+
"type": "WEB",
72+
"url": "https://craftcms.com/knowledge-base/securing-craft#set-allowAdminChanges-to-false-in-production"
73+
},
6674
{
6775
"type": "PACKAGE",
6876
"url": "https://github.com/craftcms/cms"
@@ -75,6 +83,6 @@
7583
"severity": "MODERATE",
7684
"github_reviewed": true,
7785
"github_reviewed_at": "2026-03-03T21:06:41Z",
78-
"nvd_published_at": null
86+
"nvd_published_at": "2026-03-04T17:16:21Z"
7987
}
8088
}

advisories/github-reviewed/2026/03/GHSA-v47q-jxvr-p68x/GHSA-v47q-jxvr-p68x.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v47q-jxvr-p68x",
4-
"modified": "2026-03-03T21:00:16Z",
4+
"modified": "2026-03-04T18:39:01Z",
55
"published": "2026-03-03T21:00:16Z",
66
"aliases": [
77
"CVE-2026-28697"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-v47q-jxvr-p68x"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28697"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/craftcms/cms/pull/18216"
@@ -83,6 +87,6 @@
8387
"severity": "CRITICAL",
8488
"github_reviewed": true,
8589
"github_reviewed_at": "2026-03-03T21:00:16Z",
86-
"nvd_published_at": null
90+
"nvd_published_at": "2026-03-04T17:16:21Z"
8791
}
8892
}

advisories/github-reviewed/2026/03/GHSA-wj3p-5h3x-c74q/GHSA-wj3p-5h3x-c74q.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wj3p-5h3x-c74q",
4-
"modified": "2026-03-03T16:44:18Z",
4+
"modified": "2026-03-04T18:38:37Z",
55
"published": "2026-03-03T16:44:18Z",
66
"aliases": [
77
"CVE-2025-62879"
@@ -97,6 +97,14 @@
9797
"type": "WEB",
9898
"url": "https://github.com/rancher/backup-restore-operator/security/advisories/GHSA-wj3p-5h3x-c74q"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62879"
103+
},
104+
{
105+
"type": "WEB",
106+
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-62879"
107+
},
100108
{
101109
"type": "PACKAGE",
102110
"url": "https://github.com/rancher/backup-restore-operator"
@@ -109,6 +117,6 @@
109117
"severity": "MODERATE",
110118
"github_reviewed": true,
111119
"github_reviewed_at": "2026-03-03T16:44:18Z",
112-
"nvd_published_at": null
120+
"nvd_published_at": "2026-03-04T16:16:25Z"
113121
}
114122
}

0 commit comments

Comments
 (0)