Cyber Posture

CVE-2026-31317

High

Published: 17 April 2026

Published
17 April 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 6.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31317 is a high-severity SSRF (CWE-918) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates untrusted inputs to the GetAssetsFieldSchema.php listener, preventing SSRF exploitation and subsequent arbitrary code execution.

prevent

Remediates the specific SSRF flaw in CraftQL v1.3.7 and prior by applying vendor patches or updates from the official repository.

preventdetect

Enforces boundary protections to monitor and restrict server-side requests to internal resources or localhost, mitigating SSRF impacts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF flaw in public-facing CraftQL service permits unauthenticated remote attackers to achieve arbitrary code execution via crafted requests, directly enabling exploitation of internet-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Craftql v1.3.7 and before is vulnerable to Server-Side Request Forgery (SSRF) which allows an attacker to execute arbitrary code via the vendor/markhuot/craftql/src/Listeners/GetAssetsFieldSchema.php file

Deeper analysisAI

CVE-2026-31317 is a Server-Side Request Forgery (SSRF) vulnerability (CWE-918) in CraftQL versions 1.3.7 and prior. The flaw exists in the file vendor/markhuot/craftql/src/Listeners/GetAssetsFieldSchema.php and enables attackers to execute arbitrary code. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to network accessibility, low attack complexity, and no privileges required.

Unauthenticated remote attackers can exploit this vulnerability without user interaction by sending crafted requests to a vulnerable CraftQL instance. Exploitation leads to arbitrary code execution, resulting in high confidentiality impact as attackers can access sensitive data or internal resources via SSRF.

Mitigation details are available in related references, including the official CraftQL repository at https://github.com/markhuot/craftql and a proof-of-concept repository at https://github.com/stormmmg/craftql_ssrf/, with additional documentation at https://github.com/stormmmg/craftql_ssrf/blob/master/craftql-ssrf-en/README_detail.md. The vulnerability was published on 2026-04-17T14:16:33.730.

Details

CWE(s)

CVEs Like This One

CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-26338Shared CWE-918
CVE-2025-58045Shared CWE-918
CVE-2025-68030Shared CWE-918
CVE-2025-27651Shared CWE-918
CVE-2026-39362Shared CWE-918
CVE-2026-5052Shared CWE-918

References