CVE-2026-25498 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
This vulnerability is in addition to the RCE vulnerability patched in GHSA-255j-qw47-wjh5. That advisory addressed a similar RCE vulnerability that affected two specific routes:
/index.php?p=admin%2Factions%2Ffields%2Fapply-layout-element-settings/index.php?p=admin%2Factions%2Ffields%2Frender-card-previewThis one addresses some additional endpoints that were not covered in the https://github.com/craftcms/cms/security/advisories/GHSA-255j-qw47-wjh5.
The patched vulnerability used a malicious AttributeTypecastBehavior with a wildcard event listener ("on *": "self::beforeSave") and __construct() syntax to trigger RCE via the typecastBeforeSave callback. The fix was implemented in commits:
This vulnerability follows the same attack pattern (behavior injection via "as <behavior>" syntax) but affects a different code path (assembleLayoutFromPost() in Fields.php) that was not patched in those commits. The attack vector uses typecastAfterValidate instead of typecastBeforeSave and does not require the wildcard event listener syntax, demonstrating that multiple entry points exist for this type of vulnerability.
A Remote Code Execution (RCE) vulnerability exists in Craft CMS where the assembleLayoutFromPost() function in src/services/Fields.php fails to sanitize user-supplied configuration data before passing it to Craft::createObject(). This allows authenticated administrators to inject malicious Yii2 behavior configurations that execute arbitrary system commands on the server. This vulnerability represents an unpatched variant of the behavior injection vulnerability addressed in GHSA-255j-qw47-wjh5, affecting different endpoints through a separate code path.
/admin)src/services/Fields.phpassembleLayoutFromPost() (lines 1125-1143)cleanseConfig() call on user-supplied fieldLayout POST parameter// src/services/Fields.php:1125-1133
public function assembleLayoutFromPost(?string $namespace = null): FieldLayout
{
$paramPrefix = $namespace ? rtrim($namespace, '.') . '.' : '';
$request = Craft::$app->getRequest();
$config = JsonHelper::decode($request->getBodyParam("{$paramPrefix}fieldLayout"));
// ... additional config values added ...
$layout = $this->createLayout($config); // <-- No cleanseConfig() call!
// ...
}
// src/services/Fields.php:1089-1093
public function createLayout(array $config): FieldLayout
{
$config['class'] = FieldLayout::class;
return Craft::createObject($config); // <-- Untrusted data passed directly
}
The exploitation leverages Yii2's object configuration system and behavior attachment mechanism:
'as rce' key in the fieldLayout JSON POST parameterCraft::createObject() processes the config through Yii2's BaseYii::configure()Component::__set() detects the 'as ' prefix and attaches the behaviorvalidate() is called on the model, EVENT_AFTER_VALIDATE firesAttributeTypecastBehavior calls the configured typecast function (ConsoleProcessus::execute) with the uid attribute value as the commandFieldLayout POST parameter
→ Craft::createObject()
→ Yii2 Component::__set() with 'as rce' key
→ AttributeTypecastBehavior attached
→ Model::validate() called
→ EVENT_AFTER_VALIDATE triggered
→ typecastAfterValidate → typecastAttributes()
→ call_user_func(['Psy\Readline\Hoa\ConsoleProcessus', 'execute'], $command)
→ Shell command execution
The assembleLayoutFromPost() function is called by multiple admin controllers:
| Controller | Action | Permission Required |
|------------|--------|---------------------|
| TagsController | actionSaveTagGroup() | Admin |
| CategoriesController | actionSaveGroup() | Admin |
| EntryTypesController | actionSave() | Admin |
| GlobalsController | actionSaveSet() | Admin |
| VolumesController | actionSave() | Admin |
| UsersController | actionSaveUserFieldLayout() | Admin |
| AddressesController | actionSaveAddressFieldLayout() | Admin |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.