{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1770","assignerOrgId":"4ff2b028-869f-4b00-a7b2-05997f6f14fd","state":"PUBLISHED","assignerShortName":"crafter","dateReserved":"2026-02-02T16:14:38.698Z","datePublished":"2026-02-02T16:16:01.466Z","dateUpdated":"2026-02-02T16:38:59.620Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"Studio","platforms":["Linux","MacOS","x86","ARM","64 bit"],"product":"CrafterCMS","vendor":"CrafterCMS","versions":[{"lessThan":"4.5.0","status":"affected","version":"4.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Matei \"Mal\" Badanoiu"}],"datePublic":"2026-02-02T16:01:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution).</p>"}],"value":"Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution)."}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":4.5,"baseSeverity":"MEDIUM","exploitMaturity":"UNREPORTED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/AU:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-913","description":"CWE-913 Improper Control of Dynamically-Managed Code Resources","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4ff2b028-869f-4b00-a7b2-05997f6f14fd","shortName":"crafter","dateUpdated":"2026-02-02T16:16:01.466Z"},"references":[{"url":"https://docs.craftercms.org/current/security/advisory.html#cv-2026020201"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Enable the Groovy Sandbox whitelist mode:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://craftercms.com/docs/current/reference/modules/studio.html#enabling-the-sandbox-whitelist\">https://craftercms.com/docs/current/reference/modules/studio.html#enabling-the-sandbox-whitelist</a>"}],"value":"Enable the Groovy Sandbox whitelist mode:  https://craftercms.com/docs/current/reference/modules/studio.html#enabling-the-sandbox-whitelist"}],"source":{"discovery":"EXTERNAL"},"title":"Improper Control of Dynamically-Managed Code Resources in Crafter Studio","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-02T16:38:34.866456Z","id":"CVE-2026-1770","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-02T16:38:59.620Z"}}]}}