Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25498
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-09 Feb, 2026 | 20:15
Updated At-19 Feb, 2026 | 19:20

Craft is a platform for creating digital experiences. In versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, a Remote Code Execution (RCE) vulnerability exists in Craft CMS where the assembleLayoutFromPost() function in src/services/Fields.php fails to sanitize user-supplied configuration data before passing it to Craft::createObject(). This allows authenticated administrators to inject malicious Yii2 behavior configurations that execute arbitrary system commands on the server. This vulnerability represents an unpatched variant of the behavior injection vulnerability addressed in CVE-2025-68455, affecting different endpoints through a separate code path. This vulnerability is fixed in 5.8.22.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.6HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

craftcms
craftcms
>>craft_cms>>Versions between 4.0.0(exclusive) and 4.16.18(exclusive)
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>Versions between 5.0.0(exclusive) and 5.8.22(exclusive)
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>4.0.0
cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>4.0.0
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>4.0.0
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>4.0.0
cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>5.0.0
cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*
craftcms
craftcms
>>craft_cms>>5.0.0
cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-470Primarysecurity-advisories@github.com
CWE ID: CWE-470
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/craftcms/cms/commit/395c64f0b80b507be1c862a2ec942eaacb353748security-advisories@github.com
Patch
https://github.com/craftcms/cms/releases/tag/5.8.22security-advisories@github.com
Release Notes
https://github.com/craftcms/cms/security/advisories/GHSA-7jx7-3846-m7w7security-advisories@github.com
Exploit
Vendor Advisory
Patch
Hyperlink: https://github.com/craftcms/cms/commit/395c64f0b80b507be1c862a2ec942eaacb353748
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/craftcms/cms/releases/tag/5.8.22
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/craftcms/cms/security/advisories/GHSA-7jx7-3846-m7w7
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Patch
Change History
0Changes found

Details not found