CraftCMS has an RCE vulnerability via relational conditionals in the control panel
Package
Affected versions
>= 5.0.0-RC1, <= 5.9.8
>= 4.0.0-beta.1, <= 4.17.3
Patched versions
5.9.9
4.17.4
Description
Published to the GitHub Advisory Database
Mar 11, 2026
Reviewed
Mar 11, 2026
Last updated
Mar 11, 2026
A Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system.
The
BaseElementSelectConditionRule::getElementIds()method passes user-controlled string inputthrough
renderObjectTemplate()-- an unsandboxed Twig rendering function with escaping disabled.Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full
RCE by sending a crafted condition rule via standard element listing endpoints.
This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and
bypasses all production hardening settings (allowAdminChanges: false, devMode: false,
enableTwigSandbox: true).
Users should update to the patched 5.99 release to mitigate the issue.
References