The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32263

CVE-2026-32263: Craft CMS Privilege Escalation Vulnerability

CVE-2026-32263 is a privilege escalation vulnerability in Craft CMS that allows administrators to inject Yii2 behavior handlers. This article covers technical details, affected versions 5.6.0-5.9.10, and mitigation.

Published: March 20, 2026

CVE-2026-32263 Overview

CVE-2026-32263 is a high-severity Object Injection vulnerability affecting Craft CMS, a popular content management system built on the Yii2 PHP framework. The vulnerability exists in src/controllers/EntryTypesController.php where the $settings array from parse_str is passed directly to Craft::configure() without proper sanitization using Component::cleanseConfig(). This allows attackers to inject Yii2 behavior and event handlers through specially crafted "as" or "on" prefixed keys, potentially leading to remote code execution.

Critical Impact

Authenticated administrators can exploit this vulnerability to inject malicious Yii2 behavior/event handlers, potentially achieving remote code execution on vulnerable Craft CMS installations.

Affected Products

  • Craft CMS versions 5.6.0 to 5.9.10
  • craftcms craft_cms

Discovery Timeline

  • 2026-03-16 - CVE-2026-32263 published to NVD
  • 2026-03-17 - Last updated in NVD database

Technical Details for CVE-2026-32263

Vulnerability Analysis

This vulnerability is classified as CWE-470 (Use of Externally-Controlled Input to Select Classes or Code), a type of Object Injection flaw. The vulnerability stems from improper handling of user-controlled input in the Entry Types controller. When processing configuration settings, the controller fails to sanitize array keys that use Yii2's special prefixes ("as" for behaviors and "on" for event handlers).

The Yii2 framework's Craft::configure() method interprets keys prefixed with "as" as behavior definitions and "on" as event handler definitions. Without proper cleansing via Component::cleanseConfig(), attackers with control panel administrator access can inject arbitrary PHP class instantiations or callable references through these specially crafted keys.

Exploitation requires authenticated access to the Craft CMS control panel with administrator privileges, and the allowAdminChanges configuration option must be enabled. This represents the same attack vector identified in a previous advisory, indicating an incomplete fix in the affected version range.

Root Cause

The root cause is the direct passage of unsanitized user input from parse_str() to Craft::configure() in EntryTypesController.php. The Component::cleanseConfig() helper function, which is designed to strip dangerous "as" and "on" prefixed keys from configuration arrays, was not being called before the configuration was applied. This oversight allows specially crafted input to bypass security controls and register arbitrary behaviors or event handlers on Yii2 components.

Attack Vector

The attack is network-accessible and requires authenticated access with administrator privileges. An attacker must have valid credentials for the Craft CMS control panel and the allowAdminChanges setting must be enabled (which is the default in development environments). The attacker crafts malicious entry type settings containing "as" or "on" prefixed array keys that reference attacker-controlled PHP classes or callables. When processed by the vulnerable controller, these handlers are registered and executed, potentially allowing arbitrary code execution on the server.

php
// Security patch adding Component helper import
// Source: https://github.com/craftcms/cms/commit/d37389dbffafa565143be40a2ab1e1db22a863f7
 use craft\enums\Color;
 use craft\fieldlayoutelements\entries\EntryTitleField;
 use craft\helpers\ArrayHelper;
+use craft\helpers\Component;
 use craft\helpers\Cp;
 use craft\helpers\Html;
 use craft\helpers\StringHelper;

The patch adds the Component helper import, which is then used to call Component::cleanseConfig() on the settings array before passing it to Craft::configure(), removing any dangerous "as" or "on" prefixed keys.

Detection Methods for CVE-2026-32263

Indicators of Compromise

  • Unusual HTTP POST requests to entry type configuration endpoints containing "as " or "on " prefixed parameters
  • Unexpected PHP errors or warnings related to class instantiation in Craft CMS logs
  • Evidence of unauthorized behavior or event handler registration in application debug logs

Detection Strategies

  • Monitor web application logs for suspicious requests to /admin/entry-types/ endpoints with unusual parameter names
  • Implement Web Application Firewall (WAF) rules to detect and block requests containing Yii2 behavior injection patterns
  • Review Craft CMS audit logs for unexpected entry type configuration changes by administrator accounts
  • Deploy SentinelOne Singularity to detect and prevent malicious PHP code execution attempts

Monitoring Recommendations

  • Enable verbose logging for Craft CMS control panel authentication and configuration changes
  • Monitor for unexpected child processes spawned by PHP-FPM or web server processes
  • Set up alerts for any modifications to entry type configurations outside of normal change windows
  • Track administrator account activity for signs of account compromise or privilege abuse

How to Mitigate CVE-2026-32263

Immediate Actions Required

  • Upgrade Craft CMS to version 5.9.11 or later immediately
  • Review administrator account access and ensure only authorized personnel have control panel privileges
  • Consider disabling allowAdminChanges in production environments if not required
  • Audit recent entry type configuration changes for signs of exploitation

Patch Information

The vulnerability has been patched in Craft CMS version 5.9.11. The fix ensures that Component::cleanseConfig() is called on the settings array before it is passed to Craft::configure(), effectively removing any dangerous "as" or "on" prefixed keys that could be used for behavior/event handler injection.

For detailed patch information, refer to the GitHub Security Advisory GHSA-qx2q-q59v-wf3j and the related security fix commit.

Workarounds

  • Disable allowAdminChanges in your Craft CMS configuration to prevent administrative changes via the control panel
  • Restrict control panel access to trusted IP addresses only using firewall rules or .htaccess
  • Implement additional authentication factors for administrator accounts
  • Deploy a Web Application Firewall with rules to block requests containing Yii2 injection patterns
bash
# Configuration example - Disable admin changes in production
# Add to config/general.php
# 'allowAdminChanges' => false,

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechCraft Cms

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-470
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-7jx7-3846-m7w7

  • GitHub Security Advisory GHSA-qx2q-q59v-wf3j
  • Related CVEs
  • CVE-2026-32267: Craft CMS Privilege Escalation Vulnerability

  • CVE-2026-25497: Craft CMS GraphQL Privilege Escalation

  • CVE-2026-33162: Craft CMS Auth Bypass Vulnerability

  • CVE-2026-33161: Craft CMS Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English