CVE Vulnerabilities

CVE-2026-25493

Server-Side Request Forgery (SSRF)

Published: Feb 09, 2026 | Modified: Feb 19, 2026
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows HTTP redirects by default. An attacker can bypass all SSRF protections by hosting a redirect that points to cloud metadata endpoints or any internal IP addresses. This issue is patched in versions 4.16.18 and 5.8.22.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

NameVendorStart VersionEnd Version
Craft_cmsCraftcms4.0.0 (excluding)4.16.18 (excluding)
Craft_cmsCraftcms5.0.0 (excluding)5.8.22 (excluding)
Craft_cmsCraftcms4.0.0 (including)4.0.0 (including)
Craft_cmsCraftcms4.0.0-rc1 (including)4.0.0-rc1 (including)
Craft_cmsCraftcms4.0.0-rc2 (including)4.0.0-rc2 (including)
Craft_cmsCraftcms4.0.0-rc3 (including)4.0.0-rc3 (including)
Craft_cmsCraftcms5.0.0 (including)5.0.0 (including)
Craft_cmsCraftcms5.0.0-rc1 (including)5.0.0-rc1 (including)

References