Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27128— Craft CMS's race condition in Token Service potentially allows for token usage greater than the token limit

EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27128

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Craft CMS's race condition in Token Service potentially allows for token usage greater than the token limit
Source: NVD (National Vulnerability Database)
Vulnerability Description
Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, a Time-of-Check-Time-of-Use (TOCTOU) race condition exists in Craft CMS’s token validation service for tokens that explicitly set a limited usage. The `getTokenRoute()` method reads a token’s usage count, checks if it’s within limits, then updates the database in separate non-atomic operations. By sending concurrent requests, an attacker can use a single-use impersonation token multiple times before the database update completes. To make this work, an attacker needs to obtain a valid user account impersonation URL with a non-expired token via some other means and exploit a race condition while bypassing any rate-limiting rules in place. For this to be a privilege escalation, the impersonation URL must include a token for a user account with more permissions than the current user. Versions 4.16.19 and 5.8.23 patch the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Source: NVD (National Vulnerability Database)
Vulnerability Title
Craft CMS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Craft CMS是Craft CMS开源的一套内容管理系统(CMS)。 Craft CMS 4.5.0-RC1版本至4.16.18版本和5.0.0-RC1版本至5.8.22版本存在安全漏洞,该漏洞源于令牌验证服务存在TOCTOU竞争条件,可能导致单次使用令牌被多次使用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
craftcmscms >= 4.5.0-RC1, < 4.16.19 -

II. Public POCs for CVE-2026-27128

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27128

登录查看更多情报信息。

Same Patch Batch · craftcms · 2026-02-24 · 4 CVEs total

CVE-2026-27127Craft CMS has Cloud Metadata SSRF Protection Bypass via DNS Rebinding
CVE-2026-27129Cloud Metadata SSRF Protection Bypass via IPv6 Resolution
CVE-2026-27126Craft CMS has Stored XSS in Table Field via "HTML" Column Type

IV. Related Vulnerabilities

V. Comments for CVE-2026-27128

No comments yet


Leave a comment