{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:52:04.656","vulnerabilities":[{"cve":{"id":"CVE-2026-29069","sourceIdentifier":"security-advisories@github.com","published":"2026-03-04T17:16:22.020","lastModified":"2026-03-05T10:40:07.113","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Craft is a content management system (CMS). Prior to 5.9.0-beta.2 and 4.17.0-beta.2, the actionSendActivationEmail() endpoint is accessible to unauthenticated users and does not require a permission check for pending users. An attacker with no prior access can trigger activation emails for any pending user account by knowing or guessing the user ID. If the attacker controls the target user’s email address, they can activate the account and gain access to the system. This vulnerability is fixed in 5.9.0-beta.2 and 4.17.0-beta.2."},{"lang":"es","value":"Craft es un sistema de gestión de contenido (CMS). Antes de 5.9.0-beta.2 y 4.17.0-beta.2, el endpoint actionSendActivationEmail() es accesible para usuarios no autenticados y no requiere una verificación de permisos para usuarios pendientes. Un atacante sin acceso previo puede activar correos electrónicos de activación para cualquier cuenta de usuario pendiente al conocer o adivinar el ID de usuario. Si el atacante controla la dirección de correo electrónico del usuario objetivo, puede activar la cuenta y obtener acceso al sistema. Esta vulnerabilidad está corregida en 5.9.0-beta.2 y 4.17.0-beta.2."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"4.0.0","versionEndExcluding":"4.17.0","matchCriteriaId":"FD3AD543-D77F-4B2E-AF8D-1C7C724BD26D"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*","versionStartExcluding":"5.0.0","versionEndExcluding":"5.9.0","matchCriteriaId":"81B9164E-4845-4D81-A841-378CE4E32485"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*","matchCriteriaId":"610F6DE9-720F-45B3-81D5-18E7F6B090FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"CC2F40FC-7C27-456A-B16D-679410D1D5CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"FBAA8227-04F8-404C-907B-B0162B325F5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"21B28E2C-327A-4CE6-ACAD-97E459712A55"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:4.17.0:beta1:*:*:*:*:*:*","matchCriteriaId":"775C3A5C-61B4-447D-86E7-BC4B7A5F1326"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*","matchCriteriaId":"1C7461CF-35AB-48E1-88B6-956DAE1D2AB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"8D8E02D1-601A-4E2B-B619-4775BFDB72D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_cms:5.9.0:beta1:*:*:*:*:*:*","matchCriteriaId":"A0F54615-DB68-4762-8913-BB404BABF023"}]}]}],"references":[{"url":"https://github.com/craftcms/cms/commit/c3d02d4a7246f516933f42106c0a67ce062f68d8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/cms/security/advisories/GHSA-234q-vvw3-mrfq","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}