<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cms (&gt;= 5.0.0-RC1, &lt; 5.9.18) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cms--5.0.0-rc1--5.9.18/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 17:54:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cms--5.0.0-rc1--5.9.18/feed.xml" rel="self" type="application/rss+xml"/><item><title>Craft CMS Missing Volume Permission Check Allows Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-craftcms-infoleak/</link><pubDate>Wed, 06 May 2026 17:54:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-craftcms-infoleak/</guid><description>Craft CMS versions 5.0.0-RC1 before 5.9.18 are vulnerable to information disclosure where an authenticated control panel user with only accessCp permission can discover filenames and the complete folder structure of assets in unauthorized volumes by supplying arbitrary asset IDs to AssetsController::actionShowInFolder(), exposing sensitive volume structures and enabling targeted follow-up attacks.</description><content:encoded><![CDATA[<p>Craft CMS versions 5.0.0-RC1 prior to 5.9.18 contain an information disclosure vulnerability in the <code>AssetsController::actionShowInFolder()</code> method. This flaw allows any authenticated control panel user, regardless of their volume permissions, to enumerate asset filenames and folder structures of all volumes within the Craft CMS instance. The vulnerability arises from the method fetching asset data and returning its folder hierarchy without properly validating the requesting user&rsquo;s permissions for the asset&rsquo;s volume. This issue was introduced shortly before a patch wave addressing similar vulnerabilities in other <code>AssetsController</code> actions, suggesting an oversight in the initial patch implementation. Successful exploitation allows attackers to gain unauthorized insight into sensitive asset organization, which can then be leveraged for subsequent attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Craft CMS control panel with minimal permissions (accessCp only).</li>
<li>The attacker crafts a malicious request targeting the <code>AssetsController::actionShowInFolder()</code> endpoint.</li>
<li>The request includes an <code>assetId</code> parameter with the ID of an asset residing in a protected volume.</li>
<li>The <code>AssetsController::actionShowInFolder()</code> method processes the request and fetches the asset information without validating volume-level permissions.</li>
<li>The system retrieves the asset&rsquo;s filename and complete folder hierarchy, including volume handle, volume UID, folder names, folder UIDs, and folder URI paths.</li>
<li>The asset data is encoded as a JSON response.</li>
<li>The JSON response is sent back to the attacker, revealing sensitive structural data about the asset and its parent volume.</li>
<li>The attacker gains unauthorized knowledge of asset filenames and folder structures, potentially enabling targeted attacks to access the exposed files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows any authenticated user with access to the Craft CMS control panel to discover filenames and folder structures of assets in volumes they should not have access to. This exposure of sensitive volume structures, such as private document repositories or confidential media, can lead to unauthorized access to internal files and potentially further compromise of the system. An attacker with knowledge of a private asset&rsquo;s filename and folder path can use this information to launch more targeted attacks, such as attempting to directly access the file through other vulnerabilities or misconfigurations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Craft CMS to version 5.9.18 or later to patch the vulnerability (CVE-2026-44012).</li>
<li>Deploy the Sigma rule <code>Detect Craft CMS Unauthorized Asset Folder Structure Access</code> to detect unauthorized access attempts to asset folder structures via the <code>AssetsController::actionShowInFolder</code> endpoint.</li>
<li>Review and enforce strict access control policies within Craft CMS, ensuring that users only have the minimum necessary permissions to access volumes and assets.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>information-disclosure</category><category>web-application</category><category>craftcms</category></item></channel></rss>