GHSA-F582-6GF6-GX4G
Vulnerability from github – Published: 2026-03-24 17:28 – Updated: 2026-03-25 21:00
VLAI?
Summary
Craft CMS has an authorization bypass which allows any control panel user to move entries without permissions
Details
Summary
An authenticated control panel user with only accessCp can move entries across sections via POST /actions/entries/move-to-section, even when they do not have saveEntries:{sectionUid} permission for either source or destination section.
Details
Root-cause analysis
- actionMoveToSection accepts sectionId and entryIds, loads entries, and iterates:
Craft::$app->getEntries()->moveEntryToSection($entry, $section). - The endpoint does not enforce per-entry or per-section authorization checks.
moveEntryToSection()also does not enforce current-user authorization.- There is a permission check in
actionMoveToSectionModalDatafor building UI options, but that check is not enforced in the actual endpoint. - Therefore, a direct POST request can bypass UI filtering and perform unauthorized entry moves.
### Impact
- This is an authorization bypass permitting unauthorized content changes.
- Authenticated low-privileged control panel users can move entries they should not be able to manage, violating integrity and potentially disrupting routing/editorial controls.
Severity ?
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 5.9.13"
},
"package": {
"ecosystem": "Packagist",
"name": "craftcms/cms"
},
"ranges": [
{
"events": [
{
"introduced": "5.3.0"
},
{
"fixed": "5.9.14"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-33162"
],
"database_specific": {
"cwe_ids": [
"CWE-285",
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-24T17:28:40Z",
"nvd_published_at": "2026-03-24T18:16:10Z",
"severity": "MODERATE"
},
"details": "### Summary\n\nAn authenticated control panel user with only accessCp can move entries across sections via POST `/actions/entries/move-to-section`, even when they do not have `saveEntries:{sectionUid}` permission for either source or destination section.\n\n### Details\n\n#### Root-cause analysis\n\n 1. actionMoveToSection accepts sectionId and entryIds, loads entries, and iterates:\n`Craft::$app-\u003egetEntries()-\u003emoveEntryToSection($entry, $section)`.\n 2. The endpoint does not enforce per-entry or per-section authorization checks.\n 3. `moveEntryToSection()` also does not enforce current-user authorization.\n 4. There is a permission check in `actionMoveToSectionModalData` for building UI options, but that check is not enforced in the actual endpoint.\n 5. Therefore, a direct POST request can bypass UI filtering and perform unauthorized entry moves.\n\n ### Impact\n\n* This is an authorization bypass permitting unauthorized content changes.\n* Authenticated low-privileged control panel users can move entries they should not be able to manage, violating integrity and potentially disrupting routing/editorial controls.",
"id": "GHSA-f582-6gf6-gx4g",
"modified": "2026-03-25T21:00:30Z",
"published": "2026-03-24T17:28:40Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-f582-6gf6-gx4g"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33162"
},
{
"type": "WEB",
"url": "https://github.com/craftcms/cms/commit/3c1ab1c4445dd9237855a66e6a06ecf3591a718e"
},
{
"type": "PACKAGE",
"url": "https://github.com/craftcms/cms"
},
{
"type": "WEB",
"url": "https://github.com/craftcms/cms/releases/tag/5.9.14"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "Craft CMS has an authorization bypass which allows any control panel user to move entries without permissions"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…