CVE-2026-28781

Source
https://cve.org/CVERecord?id=CVE-2026-28781
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28781.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-28781
Aliases
Published
2026-03-04T16:31:39.357Z
Modified
2026-04-10T05:41:24.965476Z
Severity
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Craft Affected by Entries Authorship Spoofing via Mass Assignment
Details

Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the entry creation process allows for Mass Assignment of the authorId attribute. A user with "Create Entries" permission can inject the authorIds[] (or authorId) parameter into the POST request, which the backend processes without verifying if the current user is authorized to assign authorship to others. Normally, this field is not present in the request for users without the necessary permissions. By manually adding this parameter, an attacker can attribute the new entry to any user, including Admins. This effectively "spoofs" the authorship. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28781.json",
    "cwe_ids": [
        "CWE-639",
        "CWE-915"
    ]
}
References

Affected packages

Git / github.com/craftcms/cms

Affected ranges

Type
GIT
Repo
https://github.com/craftcms/cms
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.0.0-RC1"
        },
        {
            "fixed": "5.9.0-beta.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/craftcms/cms
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.0.0-RC1"
        },
        {
            "fixed": "4.17.0-beta.1"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28781.json"