CVE-2026-25633: CWE-862: Missing Authorization in statamic cms
CVE-2026-25633 is a medium severity vulnerability in Statamic CMS versions prior to 5. 73. 6 and between 6. 0. 0-alpha. 1 and 6. 2. 5. It involves missing authorization checks (CWE-862) that allow authenticated users without permission to view assets to download them and access their metadata. This flaw does not affect logged-out users or those without control panel access.
AI Analysis
Technical Summary
CVE-2026-25633 is a missing authorization vulnerability (CWE-862) in Statamic CMS, a Laravel and Git-powered content management system used for website building. The flaw exists in versions prior to 5.73.6 and between 6.0.0-alpha.1 and 6.2.5, where users who are authenticated but lack explicit permission to view assets can still download those assets and view their metadata. This occurs because the system fails to properly enforce permission checks on asset access requests. However, unauthenticated users and those without control panel access cannot exploit this vulnerability. The vulnerability affects confidentiality by exposing potentially sensitive asset data but does not impact data integrity or system availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, required privileges (authenticated user), no user interaction, and limited impact on confidentiality only. The issue has been addressed in Statamic versions 5.73.6 and 6.2.5, where proper authorization checks have been implemented to restrict asset downloads to authorized users only. No public exploits have been reported to date, but the vulnerability could be leveraged by insiders or compromised accounts to access restricted content.
Potential Impact
For European organizations using affected versions of Statamic CMS, this vulnerability poses a risk of unauthorized disclosure of digital assets and their metadata. This could lead to leakage of sensitive information such as proprietary images, documents, or other media stored within the CMS. While it does not allow modification or deletion of assets, the confidentiality breach could have reputational, legal, or competitive impacts, especially for organizations handling sensitive or regulated data. Attackers with valid user credentials but insufficient permissions could exploit this flaw to bypass access controls. Given the widespread use of CMS platforms in Europe across industries including media, government, and e-commerce, the exposure of asset data could facilitate further attacks or data leakage. However, the requirement for authenticated access limits the scope to insider threats or compromised accounts rather than external unauthenticated attackers.
Mitigation Recommendations
European organizations should immediately upgrade Statamic CMS installations to versions 5.73.6 or 6.2.5 or later to ensure the authorization checks are properly enforced. In addition, organizations should audit user permissions to ensure that only necessary personnel have access to asset viewing privileges. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Regularly monitor access logs for unusual asset download activity by users without appropriate permissions. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. If upgrading immediately is not feasible, consider implementing web application firewall (WAF) rules to detect and block unauthorized asset download requests based on user roles or request patterns. Finally, conduct security awareness training to reduce insider threat risks and encourage prompt reporting of suspicious behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2026-25633: CWE-862: Missing Authorization in statamic cms
Description
CVE-2026-25633 is a medium severity vulnerability in Statamic CMS versions prior to 5. 73. 6 and between 6. 0. 0-alpha. 1 and 6. 2. 5. It involves missing authorization checks (CWE-862) that allow authenticated users without permission to view assets to download them and access their metadata. This flaw does not affect logged-out users or those without control panel access.
AI-Powered Analysis
Technical Analysis
CVE-2026-25633 is a missing authorization vulnerability (CWE-862) in Statamic CMS, a Laravel and Git-powered content management system used for website building. The flaw exists in versions prior to 5.73.6 and between 6.0.0-alpha.1 and 6.2.5, where users who are authenticated but lack explicit permission to view assets can still download those assets and view their metadata. This occurs because the system fails to properly enforce permission checks on asset access requests. However, unauthenticated users and those without control panel access cannot exploit this vulnerability. The vulnerability affects confidentiality by exposing potentially sensitive asset data but does not impact data integrity or system availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, required privileges (authenticated user), no user interaction, and limited impact on confidentiality only. The issue has been addressed in Statamic versions 5.73.6 and 6.2.5, where proper authorization checks have been implemented to restrict asset downloads to authorized users only. No public exploits have been reported to date, but the vulnerability could be leveraged by insiders or compromised accounts to access restricted content.
Potential Impact
For European organizations using affected versions of Statamic CMS, this vulnerability poses a risk of unauthorized disclosure of digital assets and their metadata. This could lead to leakage of sensitive information such as proprietary images, documents, or other media stored within the CMS. While it does not allow modification or deletion of assets, the confidentiality breach could have reputational, legal, or competitive impacts, especially for organizations handling sensitive or regulated data. Attackers with valid user credentials but insufficient permissions could exploit this flaw to bypass access controls. Given the widespread use of CMS platforms in Europe across industries including media, government, and e-commerce, the exposure of asset data could facilitate further attacks or data leakage. However, the requirement for authenticated access limits the scope to insider threats or compromised accounts rather than external unauthenticated attackers.
Mitigation Recommendations
European organizations should immediately upgrade Statamic CMS installations to versions 5.73.6 or 6.2.5 or later to ensure the authorization checks are properly enforced. In addition, organizations should audit user permissions to ensure that only necessary personnel have access to asset viewing privileges. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Regularly monitor access logs for unusual asset download activity by users without appropriate permissions. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. If upgrading immediately is not feasible, consider implementing web application firewall (WAF) rules to detect and block unauthorized asset download requests based on user roles or request patterns. Finally, conduct security awareness training to reduce insider threat risks and encourage prompt reporting of suspicious behavior.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-04T05:15:41.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698cea984b57a58fa1c97f43
Added to database: 2/11/2026, 8:46:16 PM
Last enriched: 2/11/2026, 9:01:09 PM
Last updated: 2/11/2026, 10:53:11 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26215: CWE-502 Deserialization of Untrusted Data in zyddnys manga-image-translator
CriticalCVE-2026-1669: CWE-73 External Control of File Name or Path in Google Keras
HighCVE-2024-50619: n/a
HighCVE-2026-26031: CWE-863: Incorrect Authorization in frappe lms
LowCVE-2026-26029: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in akutishevsky sf-mcp-server
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.