Vulnerability Description
Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a targetFilename body parameter that is used unsanitized in a deleteFile() call before Assets::prepareAssetName() is applied on save. This allows an authenticated user with replaceFiles permission to delete arbitrary files within the same filesystem root by injecting ../ path traversal sequences into the filename. This could allow an authenticated user with replaceFiles permission on one volume to delete files in other folders/volumes that share the same filesystem root. This only affects local filesystems. This issue has been patched in versions 4.17.5 and 5.9.11.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Craftcms | Craft Cms | >= 4.0.0.1, < 4.17.5 |
Related Weaknesses (CWE)
References
- https://github.com/craftcms/cms/commit/c997efbe4c66c14092714233aeebff15cdbfcf11Patch
- https://github.com/craftcms/cms/security/advisories/GHSA-472v-j2g4-g9h2PatchVendor Advisory
FAQ
What is CVE-2026-32262?
CVE-2026-32262 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a ta...
How severe is CVE-2026-32262?
CVE-2026-32262 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32262?
Check the references section above for vendor advisories and patch information. Affected products include: Craftcms Craft Cms.