CVE-2026-33162: Authorization Bypass in Craft CMS Entry Relocation
Vulnerability ID: CVE-2026-33162
CVSS Score: 4.9
Published: 2026-03-24
Craft CMS versions 5.3.0 to 5.9.13 and 4.x prior to 4.17.8 contain a Missing Authorization vulnerability (CWE-862) within the Control Panel. Authenticated users with baseline administrative access can bypass intended UI restrictions to arbitrarily relocate content entries between sections without possessing the required section-specific permissions.
TL;DR
An authorization bypass in Craft CMS allows authenticated users with standard Control Panel access to relocate content entries across sections without proper validation. The vulnerability is patched in versions 5.9.14 and 4.17.8 by implementing explicit server-side authorization checks.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-862
- Attack Vector: Network
- CVSS v4.0: 4.9
- Impact: High Integrity Loss
- Exploit Status: Proof of Concept
- CISA KEV: Not Listed
Affected Systems
- Craft CMS 5.x
- Craft CMS 4.x
-
Craft CMS: >= 5.3.0, < 5.9.14 (Fixed in:
5.9.14) -
Craft CMS: >= 4.0.0, < 4.17.8 (Fixed in:
4.17.8)
Code Analysis
Commit: 3c1ab1c
Fix Missing Authorization in EntriesController actionMoveToSection
Mitigation Strategies
- Upgrade Craft CMS to a patched version immediately.
- Audit and restrict users granted the
accessCppermission. - Monitor application logs for anomalous POST requests to the vulnerable endpoint.
Remediation Steps:
- Verify current Craft CMS version using the Control Panel or console commands.
- Backup the database and application files prior to executing the update.
- Update to Craft CMS 5.9.14 or 4.17.8 via Composer.
- Review the Craft CMS audit logs to identify any historical unauthorized entry relocations.
- Adjust user roles to revoke Control Panel access from non-essential staff.
References
- Craft CMS Security Advisory GHSA-f582-6gf6-gx4g
- Fix Commit in Repository
- Craft CMS 5.9.14 Release Notes
- CVE-2026-33162 Detail
Read the full report for CVE-2026-33162 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)