{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:29:47.201","vulnerabilities":[{"cve":{"id":"CVE-2026-28697","sourceIdentifier":"security-advisories@github.com","published":"2026-03-04T17:16:21.210","lastModified":"2026-03-05T10:37:46.627","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g., Email Templates). By calling the craft.app.fs.write() method, an attacker can write a malicious PHP script to a web-accessible directory and subsequently access it via the browser to execute arbitrary system commands. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1."},{"lang":"es","value":"Craft es un sistema de gestión de contenido (CMS). Antes de 4.17.0-beta.1 y 5.9.0-beta.1, un administrador autenticado puede lograr ejecución remota de código (RCE) inyectando una carga útil de inyección de plantillas del lado del servidor (SSTI) en campos de plantilla Twig (p. ej., Plantillas de correo electrónico). Al llamar al método craft.app.fs.write(), un atacante puede escribir un script PHP malicioso en un directorio accesible por la web y posteriormente acceder a él a través del navegador para ejecutar comandos de sistema arbitrarios. Esta vulnerabilidad está corregida en 4.17.0-beta.1 y 5.9.0-beta.1."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-1336"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"4.0.0","versionEndExcluding":"4.17.0","matchCriteriaId":"FD3AD543-D77F-4B2E-AF8D-1C7C724BD26D"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"5.0.0","versionEndExcluding":"5.9.0","matchCriteriaId":"81B9164E-4845-4D81-A841-378CE4E32485"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*","matchCriteriaId":"610F6DE9-720F-45B3-81D5-18E7F6B090FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"CC2F40FC-7C27-456A-B16D-679410D1D5CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"FBAA8227-04F8-404C-907B-B0162B325F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"21B28E2C-327A-4CE6-ACAD-97E459712A55"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*","matchCriteriaId":"1C7461CF-35AB-48E1-88B6-956DAE1D2AB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"8D8E02D1-601A-4E2B-B619-4775BFDB72D0"}]}]}],"references":[{"url":"https://github.com/craftcms/cms/commit/9dc2a4a3ec8e9cd5e8c0d1129f36371437519197","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/cms/pull/18216","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/craftcms/cms/pull/18219","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/craftcms/cms/security/advisories/GHSA-v47q-jxvr-p68x","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Patch","Vendor Advisory"]}]}}]}