Description
Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation validates the initial URL hostname and resolved IP against a blocklist, but Guzzle follows HTTP redirects by default. An attacker can bypass all SSRF protections by hosting a redirect that points to cloud metadata endpoints or any internal IP addresses. This issue is patched in versions 4.16.18 and 5.8.22.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/craftcms/cms/security/advisories/GHSA-8jr8-7hr4-vhfx
Patch x_refsource_misc
https://github.com/craftcms/cms/commit/0974055634af68998f67850ab2045d8aaa19fa98
Release Notes x_refsource_misc
https://github.com/craftcms/cms/releases/tag/5.8.22
Scores
CVSS v3
6.5
EPSS
0.0002
EPSS Percentile
4.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (4)
craftcms/cms
5.0.0-RC1 - 5.8.22Packagist
craftcms/craft_cms
4.0.0 (4 CPE variants)
craftcms/craft_cms
5.0.0 (2 CPE variants)
craftcms/craft_cms
4.0.0 - 4.16.18
Published
Feb 09, 2026
Tracked Since
Feb 18, 2026