Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28423: CWE-918: Server-Side Request Forgery (SSRF) in statamic cms

0
Medium
VulnerabilityCVE-2026-28423cvecve-2026-28423cwe-918
Published: Fri Feb 27 2026 (02/27/2026, 22:11:55 UTC)
Source: CVE Database V5
Vendor/Project: statamic
Product: cms

Description

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 and 6.4.0, when Glide image manipulation is used in insecure mode (which is not the default), the image proxy can be abused by an unauthenticated user to make the server send HTTP requests to arbitrary URLs—either via the URL directly or via the watermark feature. That can allow access to internal services, cloud metadata endpoints, and other hosts reachable from the server. This has been fixed in 5.73.11 and 6.4.0.

AI-Powered Analysis

AILast updated: 02/27/2026, 22:48:40 UTC

Technical Analysis

Statamic CMS, a Laravel and Git-powered content management system, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-28423. This vulnerability arises when the Glide image manipulation feature is enabled in insecure mode, which is not the default configuration. In this mode, the image proxy functionality can be manipulated by unauthenticated attackers to force the server to send HTTP requests to arbitrary URLs. Attackers can exploit this by crafting URLs directly or leveraging the watermark feature to induce the server to make requests to internal network resources, cloud metadata endpoints (such as AWS or Azure metadata services), or other hosts accessible from the server environment. This can lead to unauthorized disclosure of sensitive internal information. The vulnerability affects Statamic CMS versions below 5.73.11 and versions from 6.0.0 up to but not including 6.4.0. The flaw has been addressed in versions 5.73.11 and 6.4.0 by securing the Glide image proxy to prevent SSRF exploitation. The CVSS 3.1 base score is 6.8, reflecting medium severity, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, scope changed, high confidentiality impact, and no integrity or availability impact. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this SSRF vulnerability is the potential unauthorized access to internal network resources and cloud metadata endpoints, which can lead to significant confidentiality breaches. Attackers could retrieve sensitive information such as internal IP addresses, configuration data, or cloud instance credentials from metadata services, enabling further attacks like privilege escalation or lateral movement within the network. Since the vulnerability does not require authentication or user interaction, it poses a risk to any exposed Statamic CMS instance configured with insecure Glide mode. However, the attack complexity is high due to the need for insecure mode activation, which is not the default, somewhat limiting widespread exploitation. Organizations using affected Statamic CMS versions in environments with sensitive internal services or cloud infrastructure are at elevated risk. The vulnerability does not directly impact data integrity or system availability but can be a stepping stone for more severe attacks.

Mitigation Recommendations

Organizations should immediately upgrade Statamic CMS to version 5.73.11 or 6.4.0 or later, where the SSRF vulnerability has been fixed. If upgrading is not immediately possible, administrators should ensure that the Glide image manipulation feature is not configured in insecure mode, as this is the prerequisite for exploitation. Network-level controls should be implemented to restrict outbound HTTP requests from the CMS server to only trusted destinations, preventing unauthorized internal or cloud metadata endpoint access. Additionally, monitoring and logging of outbound requests from the CMS server can help detect suspicious SSRF attempts. Employing web application firewalls (WAFs) with SSRF detection rules can provide an additional layer of defense. Finally, review and restrict access to cloud metadata services using cloud provider-specific controls (e.g., IMDSv2 for AWS) to reduce the risk of metadata exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a21f2232ffcdb8a27f4a84

Added to database: 2/27/2026, 10:48:02 PM

Last enriched: 2/27/2026, 10:48:40 PM

Last updated: 2/28/2026, 1:42:19 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses