Metrics
Affected Vendors & Products
No advisories yet.
Solution
Enable the Groovy Sandbox whitelist mode: https://craftercms.com/docs/current/reference/modules/studio.html#enabling-the-sandbox-whitelist
Workaround
No workaround given by the vendor.
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. By inserting malicious Groovy elements, an attacker may bypass sandbox restrictions and obtain RCE (Remote Code Execution). | |
| Title | Improper Control of Dynamically-Managed Code Resources in Crafter Studio | |
| Weaknesses | CWE-913 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: crafter
Published:
Updated: 2026-02-02T16:38:59.620Z
Reserved: 2026-02-02T16:14:38.698Z
Link: CVE-2026-1770
Updated: 2026-02-02T16:38:52.452Z
Status : Received
Published: 2026-02-02T17:16:17.643
Modified: 2026-02-02T17:16:17.643
Link: CVE-2026-1770
No data.
OpenCVE Enrichment
No data.