CVE-2026-25496
Stored XSS in Craft Number Field Prefix/Suffix Settings
Publication date: 2026-02-09
Last updated on: 2026-02-19
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| craftcms | craft_cms | 4.0.0 |
| craftcms | craft_cms | 4.0.0 |
| craftcms | craft_cms | 4.0.0 |
| craftcms | craft_cms | 4.0.0 |
| craftcms | craft_cms | 5.0.0 |
| craftcms | craft_cms | 5.0.0 |
| craftcms | craft_cms | From 4.0.0 (exc) to 4.16.18 (exc) |
| craftcms | craft_cms | From 5.0.0 (exc) to 5.8.22 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Craft platform versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21. It is a stored Cross-Site Scripting (XSS) issue found in the Number field type settings.
Specifically, the Prefix and Suffix fields in the Number field type are rendered using the |md|raw Twig filter without proper escaping. This improper handling allows malicious scripts to be executed when the Number field is displayed on users' profiles.
The vulnerability is fixed in versions 4.16.18 and 5.8.22.
How can this vulnerability impact me? :
This stored XSS vulnerability can allow attackers to inject and execute malicious scripts in the context of users' profiles.
Such script execution can lead to unauthorized actions on behalf of users, theft of sensitive information like session cookies, or manipulation of the website content viewed by other users.
The impact depends on the privileges of the affected users and the context in which the Number field is displayed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Craft to version 4.16.18 or later, or version 5.8.22 or later, where the stored XSS issue in the Number field type settings has been patched.