Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanseConfig() to assembleLayoutFromPost() and various FieldsController actions to strip Yii2 behavior/event injection keys ("as" and "on" prefixed keys). However, the fieldLayouts parameter in ElementIndexesController::actionFilterHud() is passed directly to FieldLayout::createFromConfig() without any sanitization, enabling the same behavior injection attack chain. This issue has been patched in version 5.9.13.
We have discovered 2 live websites that are affected by CVE-2026-33157.
| Product | |
| Category | Content Management System |
| Vulnerable Domains | 2 live websites (100% of CrafterCMS install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 1 versions ( 100% of all versions) |
| 2 websites |
| .com | 1 websites |
| .de | 1 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| *******.de | **,***,*** | ||
| ***************.com | **,***,*** |
FAQ