Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. craftcms/cms
  4. ›
  5. CVE-2026-33051

CVE-2026-33051: Craft CMS Vulnerable to Stored XSS in Revision Context Menu

March 18, 2026 (updated March 20, 2026)

The revision/draft context menu in the element editor renders the creator’s fullName as raw HTML due to the use of Template::raw() combined with Craft::t() string interpolation. A low-privileged control panel user (e.g., Author) can set their fullName to an XSS payload via the profile editor, then create an entry with two saves.

If an administrator is logged in and executes a specifically crafted payload while an elevated session is active, the attacker’s account can be elevated to administrator.

Users should update to Craft 5.9.11 with the patch to mitigate the issue.

References

  • github.com/advisories/GHSA-3x4w-mxpf-fhqq
  • github.com/craftcms/cms
  • github.com/craftcms/cms/commit/f634a9d21edcafd83a6716047d275f985aba6be1
  • github.com/craftcms/cms/releases/tag/5.9.11
  • github.com/craftcms/cms/security/advisories/GHSA-3x4w-mxpf-fhqq
  • nvd.nist.gov/vuln/detail/CVE-2026-33051

Code Behaviors & Features

Detect and mitigate CVE-2026-33051 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.9.0-beta.1 before 5.9.11

Fixed versions

  • 5.9.11

Solution

Upgrade to version 5.9.11 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/craftcms/cms/CVE-2026-33051.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:51 +0000.