CVE-2026-25496
Undergoing Analysis Undergoing Analysis - In Progress
Stored XSS in Craft Number Field Prefix/Suffix Settings

Publication date: 2026-02-09

Last updated on: 2026-02-19

Assigner: GitHub, Inc.

Description
Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, a stored XSS vulnerability exists in the Number field type settings. The Prefix and Suffix fields are rendered using the |md|raw Twig filter without proper escaping, allowing script execution when the Number field is displayed on users' profiles. This issue is patched in versions 4.16.18 and 5.8.22.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
craftcms craft_cms 4.0.0
craftcms craft_cms 4.0.0
craftcms craft_cms 4.0.0
craftcms craft_cms 4.0.0
craftcms craft_cms 5.0.0
craftcms craft_cms 5.0.0
craftcms craft_cms From 4.0.0 (exc) to 4.16.18 (exc)
craftcms craft_cms From 5.0.0 (exc) to 5.8.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Craft platform versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21. It is a stored Cross-Site Scripting (XSS) issue found in the Number field type settings.

Specifically, the Prefix and Suffix fields in the Number field type are rendered using the |md|raw Twig filter without proper escaping. This improper handling allows malicious scripts to be executed when the Number field is displayed on users' profiles.

The vulnerability is fixed in versions 4.16.18 and 5.8.22.


How can this vulnerability impact me? :

This stored XSS vulnerability can allow attackers to inject and execute malicious scripts in the context of users' profiles.

Such script execution can lead to unauthorized actions on behalf of users, theft of sensitive information like session cookies, or manipulation of the website content viewed by other users.

The impact depends on the privileges of the affected users and the context in which the Number field is displayed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Craft to version 4.16.18 or later, or version 5.8.22 or later, where the stored XSS issue in the Number field type settings has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart