Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25633: CWE-862: Missing Authorization in statamic cms

0
Medium
VulnerabilityCVE-2026-25633cvecve-2026-25633cwe-862
Published: Wed Feb 11 2026 (02/11/2026, 20:33:51 UTC)
Source: CVE Database V5
Vendor/Project: statamic
Product: cms

Description

CVE-2026-25633 is a medium severity vulnerability in Statamic CMS versions prior to 5. 73. 6 and between 6. 0. 0-alpha. 1 and 6. 2. 5. It involves missing authorization checks (CWE-862) that allow authenticated users without permission to view assets to download them and access their metadata. This flaw does not affect logged-out users or those without control panel access.

AI-Powered Analysis

AILast updated: 02/11/2026, 21:01:09 UTC

Technical Analysis

CVE-2026-25633 is a missing authorization vulnerability (CWE-862) in Statamic CMS, a Laravel and Git-powered content management system used for website building. The flaw exists in versions prior to 5.73.6 and between 6.0.0-alpha.1 and 6.2.5, where users who are authenticated but lack explicit permission to view assets can still download those assets and view their metadata. This occurs because the system fails to properly enforce permission checks on asset access requests. However, unauthenticated users and those without control panel access cannot exploit this vulnerability. The vulnerability affects confidentiality by exposing potentially sensitive asset data but does not impact data integrity or system availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting network attack vector, low complexity, required privileges (authenticated user), no user interaction, and limited impact on confidentiality only. The issue has been addressed in Statamic versions 5.73.6 and 6.2.5, where proper authorization checks have been implemented to restrict asset downloads to authorized users only. No public exploits have been reported to date, but the vulnerability could be leveraged by insiders or compromised accounts to access restricted content.

Potential Impact

For European organizations using affected versions of Statamic CMS, this vulnerability poses a risk of unauthorized disclosure of digital assets and their metadata. This could lead to leakage of sensitive information such as proprietary images, documents, or other media stored within the CMS. While it does not allow modification or deletion of assets, the confidentiality breach could have reputational, legal, or competitive impacts, especially for organizations handling sensitive or regulated data. Attackers with valid user credentials but insufficient permissions could exploit this flaw to bypass access controls. Given the widespread use of CMS platforms in Europe across industries including media, government, and e-commerce, the exposure of asset data could facilitate further attacks or data leakage. However, the requirement for authenticated access limits the scope to insider threats or compromised accounts rather than external unauthenticated attackers.

Mitigation Recommendations

European organizations should immediately upgrade Statamic CMS installations to versions 5.73.6 or 6.2.5 or later to ensure the authorization checks are properly enforced. In addition, organizations should audit user permissions to ensure that only necessary personnel have access to asset viewing privileges. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Regularly monitor access logs for unusual asset download activity by users without appropriate permissions. Employ network segmentation and least privilege principles to limit the impact of compromised accounts. If upgrading immediately is not feasible, consider implementing web application firewall (WAF) rules to detect and block unauthorized asset download requests based on user roles or request patterns. Finally, conduct security awareness training to reduce insider threat risks and encourage prompt reporting of suspicious behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-04T05:15:41.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cea984b57a58fa1c97f43

Added to database: 2/11/2026, 8:46:16 PM

Last enriched: 2/11/2026, 9:01:09 PM

Last updated: 2/11/2026, 10:53:11 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats