CVE-2026-33162
Received Received - Intake
Improper Access Control in Craft CMS Entry Section Movement

Publication date: 2026-03-24

Last updated on: 2026-03-26

Assigner: GitHub, Inc.

Description
Craft CMS is a content management system (CMS). From version 5.3.0 to before version 5.9.14, an authenticated control panel user with only accessCp can move entries across sections via POST /actions/entries/move-to-section, even when they do not have saveEntries:{sectionUid} permission for either source or destination section. This issue has been patched in version 5.9.14.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
craftcms craft_cms From 5.3.0 (inc) to 5.9.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Craft CMS versions from 5.3.0 up to but not including 5.9.14. It allows an authenticated control panel user who only has access to the control panel (accessCp) to move entries across different sections using the POST /actions/entries/move-to-section endpoint. This action can be performed even if the user does not have the required saveEntries permission for either the source or destination section.

The issue was fixed in version 5.9.14.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing users with limited permissions to move content entries between sections without proper authorization. This could lead to unauthorized content manipulation, potentially disrupting content organization, workflow, or exposing content to unintended sections.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Craft CMS to version 5.9.14 or later, where the issue has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart