{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T09:00:17.461","vulnerabilities":[{"cve":{"id":"CVE-2026-28781","sourceIdentifier":"security-advisories@github.com","published":"2026-03-04T17:16:21.370","lastModified":"2026-03-05T19:55:03.383","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the entry creation process allows for Mass Assignment of the authorId attribute. A user with \"Create Entries\" permission can inject the authorIds[] (or authorId) parameter into the POST request, which the backend processes without verifying if the current user is authorized to assign authorship to others. Normally, this field is not present in the request for users without the necessary permissions. By manually adding this parameter, an attacker can attribute the new entry to any user, including Admins. This effectively \"spoofs\" the authorship. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1."},{"lang":"es","value":"Craft es un sistema de gestión de contenido (CMS). Antes de 4.17.0-beta.1 y 5.9.0-beta.1, el proceso de creación de entradas permite la Asignación Masiva del atributo authorId. Un usuario con permiso para 'Crear Entradas' puede inyectar el parámetro authorIds[] (o authorId) en la solicitud POST, que el backend procesa sin verificar si el usuario actual está autorizado para asignar la autoría a otros. Normalmente, este campo no está presente en la solicitud para usuarios sin los permisos necesarios. Al añadir manualmente este parámetro, un atacante puede atribuir la nueva entrada a cualquier usuario, incluidos los administradores. Esto efectivamente 'suplanta' la autoría. Esta vulnerabilidad está corregida en 4.17.0-beta.1 y 5.9.0-beta.1."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"},{"lang":"en","value":"CWE-915"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"4.0.0","versionEndExcluding":"4.17.0","matchCriteriaId":"FD3AD543-D77F-4B2E-AF8D-1C7C724BD26D"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"5.0.0","versionEndExcluding":"5.9.0","matchCriteriaId":"81B9164E-4845-4D81-A841-378CE4E32485"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*","matchCriteriaId":"610F6DE9-720F-45B3-81D5-18E7F6B090FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"CC2F40FC-7C27-456A-B16D-679410D1D5CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"FBAA8227-04F8-404C-907B-B0162B325F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"21B28E2C-327A-4CE6-ACAD-97E459712A55"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*","matchCriteriaId":"1C7461CF-35AB-48E1-88B6-956DAE1D2AB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"8D8E02D1-601A-4E2B-B619-4775BFDB72D0"}]}]}],"references":[{"url":"https://github.com/craftcms/cms/commit/830b403870cd784b47ae42a3f5a16e7ac2d7f5a8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/cms/commit/c6dcbdffaf6ab3ffe77d317336684d83699f4542","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/cms/security/advisories/GHSA-2xfc-g69j-x2mp","source":"security-advisories@github.com","tags":["Exploit","Patch","Vendor Advisory"]}]}}]}