CVE-2026-41130 PUBLISHED

Craft CMS has a host header injection leading to SSRF via resource-js endpoint

Assigner: GitHub_M
Reserved: 17.04.2026 Published: 21.04.2026 Updated: 21.04.2026

Craft CMS is a content management system (CMS). In versions on the 4.x branch through 4.17.8 and the 5.x branch through 5.9.14, the resource-js endpoint in Craft CMS allows unauthenticated requests to proxy remote JavaScript resources. When trustedHosts is not explicitly restricted (default configuration), the application trusts the client-supplied Host header. This allows an attacker to control the derived baseUrl, which is used in prefix validation inside actionResourceJs(). By supplying a malicious Host header, the attacker can make the server issue arbitrary HTTP requests, leading to Server-Side Request Forgery (SSRF). Versions 4.17.9 and 5.9.15 patch the issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.5

Product Status

Vendor craftcms
Product cms
Versions
  • Version >= 5.0.0-RC1, < 5.9.15 is affected
  • Version >= 4.0.0-RC1, < 4.17.9 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE