Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.7

Craft Commerce: SQL Injection Can Run Unwanted Code on Server

CVE-2026-32271 GHSA-875v-7m49-8x88 GHSA-875v-7m49-8x88
Summary

The Craft Commerce platform has a security flaw that lets anyone with access to the control panel run malicious code on the server. This could happen if a user with a control panel account makes a specific request, and it's fixed in newer versions of the software.

What to do
  • Update craftcms commerce to version 4.10.3.
  • Update craftcms commerce to version 5.5.5.
  • Update craftcms craftcms/commerce to version 4.10.3.
  • Update craftcms craftcms/commerce to version 5.5.5.
Affected software
VendorProductAffected versionsFix available
craftcms commerce > 4.0.0 , <= 4.10.2 4.10.3
craftcms commerce > 5.0.0 , <= 5.5.4 5.5.5
craftcms craftcms/commerce > 4.0.0 , <= 4.10.3 4.10.3
craftcms craftcms/commerce > 5.0.0 , <= 5.5.5 5.5.5
Original title
Craft Commerce has a SQL Injection can lead to Remote Code Execution via TotalRevenue Widget
Original description
## Summary

A SQL injection in the Commerce TotalRevenue widget can lead to remote code execution through a chain of four vulnerabilities:

* SQL Injection -- The TotalRevenue stat interpolates unsanitized widget settings directly into a sprintf-based SQL Expression. Any control panel user can create any widget type without permission checks.

* PDO Multi-Statement Queries -- PHP `PDO MySQL` enables `CLIENT_MULTI_STATEMENTS` by default. Neither Yii2 nor Craft CMS disables it. This allows stacking an INSERT statement after the injected SELECT , writing a maliciously serialized PHP object into the queue table.

* Unrestricted `unserialize()` -- The yii2-queue PhpSerializer calls `unserialize()` with no allowed_classes restriction on every queue job. When the queue consumer processes the injected job, it instantiates the attacker-controlled object.

* Gadget Chain (FileCookieJar) -- `GuzzleHttp\Cookie\FileCookieJar` (a standard Guzzle dependency) has an unguarded `__destruct()` method that calls `file_put_contents()`. The attacker’s serialized payload writes a PHP webshell to the server’s webroot. PHP tags survive `json_encode()` because Guzzle uses `options=0` (no `JSON_HEX_TAG`).

The complete chain requires 3 HTTP requests and achieves arbitrary command execution as the PHP process user. Queue processing is triggered via GET `/actions/queue/run`, an endpoint that requires no authentication (`$allowAnonymous = ['run']`).

## RCE Exploitation Steps

* Authenticate as any control panel user
* POST to `/admin/actions/dashboard/create-widget` with stacked SQL injection:
* `settings[type]` contains the stacked INSERT with the serialized gadget chain
* Response: HTTP 500 (expected -- INSERT already committed)
* Trigger queue processing: `GET /actions/queue/run`
* Queue consumer deserializes the gadget chain
* `FileCookieJar::__destruct()` writes webshell to webroot
* Access the webshell: `GET /poc_rce.php?c=id`
* Response: `uid=1000(home) gid=1000(home) groups=1000(home)`
nvd CVSS4.0 7.7
Vulnerability type
CWE-89 SQL Injection
Published: 14 Apr 2026 · Updated: 14 Apr 2026 · First seen: 13 Apr 2026