Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28424: CWE-862: Missing Authorization in statamic cms

0
Medium
VulnerabilityCVE-2026-28424cvecve-2026-28424cwe-862
Published: Fri Feb 27 2026 (02/27/2026, 22:14:01 UTC)
Source: CVE Database V5
Vendor/Project: statamic
Product: cms

Description

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 and 6.4.0, user email addresses were included in responses from the user fieldtype’s data endpoint for control panel users who did not have the "view users" permission. This has been fixed in 5.73.11 and 6.4.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:21:07 UTC

Technical Analysis

CVE-2026-28424 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting Statamic CMS, a Laravel and Git-powered content management system. The flaw exists in versions prior to 5.73.11 and from 6.0.0 up to but not including 6.4.0. Specifically, the vulnerability arises from insufficient authorization checks on the user fieldtype’s data endpoint within the control panel. This endpoint inadvertently exposes email addresses of control panel users to requesters who lack the 'view users' permission. The issue is a direct consequence of missing or inadequate access control enforcement, allowing unauthorized users with some level of authenticated access (low privileges) to retrieve sensitive user information. The vulnerability does not permit modification or deletion of data, nor does it impact system availability, but it compromises confidentiality by leaking personally identifiable information (email addresses). The flaw can be exploited remotely over the network without requiring user interaction, making it easier for attackers with limited privileges to gather sensitive information. The vendor addressed this issue by implementing proper authorization checks in versions 5.73.11 and 6.4.0. No public exploits have been reported to date, but the vulnerability's nature makes it a potential target for reconnaissance and phishing campaigns. The CVSS v3.1 base score is 6.5, reflecting a medium severity rating due to the high confidentiality impact but limited scope and no integrity or availability impact.

Potential Impact

The primary impact of CVE-2026-28424 is the unauthorized disclosure of email addresses of control panel users within Statamic CMS installations. This leakage can facilitate targeted phishing attacks, social engineering, and further reconnaissance by threat actors. Organizations relying on Statamic CMS for website or content management may inadvertently expose sensitive user information to unauthorized internal or external actors with low-level access. While the vulnerability does not allow direct system compromise or data manipulation, the exposure of email addresses can lead to secondary attacks that compromise organizational security posture. The impact is particularly significant for organizations with high-value or sensitive user accounts, such as government agencies, financial institutions, or enterprises with critical internal communications. Additionally, the vulnerability could erode user trust and violate privacy regulations if exploited. Since exploitation requires only low privileges and no user interaction, attackers who gain minimal access to the CMS could leverage this flaw to escalate their reconnaissance efforts. However, the absence of known exploits in the wild reduces immediate risk, though the vulnerability should be treated seriously given its potential for abuse.

Mitigation Recommendations

To mitigate CVE-2026-28424, organizations should upgrade Statamic CMS to versions 5.73.11 or later, or 6.4.0 or later, where the authorization checks have been properly implemented. If immediate upgrading is not feasible, administrators should restrict access to the control panel and its endpoints to trusted users only, minimizing the number of users with any access privileges. Implement network-level controls such as IP whitelisting or VPN access to limit exposure of the CMS interface. Review and tighten user permissions to ensure that only necessary users have access to sensitive endpoints. Monitor logs for unusual access patterns to the user fieldtype’s data endpoint that might indicate exploitation attempts. Additionally, consider implementing web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting this endpoint. Educate users about phishing risks, as leaked email addresses could be used in social engineering attacks. Regularly audit CMS configurations and user permissions to prevent privilege creep. Finally, maintain an incident response plan to quickly address any suspected data exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a21f2232ffcdb8a27f4a8c

Added to database: 2/27/2026, 10:48:02 PM

Last enriched: 3/7/2026, 9:21:07 PM

Last updated: 4/14/2026, 9:20:53 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses