Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. craftcms/cms
  4. ›
  5. CVE-2026-31858

CVE-2026-31858: CraftCMS's `ElementSearchController` Affected by Blind SQL Injection

March 11, 2026

The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in GHSA-2453-mppf-46cj.

The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it.

Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query properties, and extract the full database contents via boolean-based blind injection.

Users should update to the patched 5.9.9 release to mitigate the issue.

References

  • github.com/advisories/GHSA-g7j6-fmwx-7vp8
  • github.com/craftcms/cms
  • github.com/craftcms/cms/commit/e1a3dd669ae31491b86ad996e88a1d30d33d9a42
  • github.com/craftcms/cms/security/advisories/GHSA-2453-mppf-46cj
  • github.com/craftcms/cms/security/advisories/GHSA-g7j6-fmwx-7vp8
  • nvd.nist.gov/vuln/detail/CVE-2026-31858

Code Behaviors & Features

Detect and mitigate CVE-2026-31858 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0-RC1 before 5.9.9

Fixed versions

  • 5.9.9

Solution

Upgrade to version 5.9.9 or above.

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

packagist/craftcms/cms/CVE-2026-31858.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:44 +0000.