CVE-2026-32612: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability in Statamic CMS versions 6. 0. 0 up to but not including 6. 6. 2. It affects the control panel color mode preference feature, allowing authenticated users with control panel access to inject malicious JavaScript. This script executes when a higher-privileged user impersonates the compromised account, potentially leading to session hijacking or privilege escalation. The vulnerability requires authentication and user interaction (impersonation). It has a CVSS score of 5. 4 (medium severity) and was fixed in version 6.
AI Analysis
Technical Summary
CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability identified in the Statamic content management system (CMS), which is built on Laravel and Git. The vulnerability exists in the control panel's color mode preference feature, where improper neutralization of input allows an authenticated user with control panel access to inject malicious JavaScript code. This malicious script is stored persistently and executes when a higher-privileged user impersonates the attacker’s account within the control panel. The attack vector requires the attacker to have at least low-level authenticated access to the control panel and relies on user interaction, specifically the impersonation feature, to trigger the payload. The vulnerability affects all Statamic CMS versions from 6.0.0 up to but not including 6.6.2, where the issue has been patched. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss, such as session hijacking, unauthorized actions, or further privilege escalation within the CMS environment. No public exploits have been reported to date, but the vulnerability’s presence in a widely used CMS component makes it a notable risk for organizations relying on Statamic for content management.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with low-level authenticated access to inject malicious JavaScript that executes in the context of higher-privileged users during impersonation. This can lead to session hijacking, theft of sensitive information, unauthorized actions within the CMS, and possible privilege escalation. Organizations using affected Statamic versions risk compromise of their CMS control panels, which could lead to website defacement, data leakage, or further infiltration into internal networks. Since the vulnerability requires authentication and user interaction, the attack surface is somewhat limited; however, in environments where multiple users have control panel access or impersonation is frequently used, the risk is elevated. The vulnerability does not affect availability directly but compromises confidentiality and integrity. Given Statamic’s use in various industries for content management, the impact can be significant, especially for organizations with sensitive or high-profile web content.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Statamic CMS to version 6.6.2 or later, where the issue is patched. Until the upgrade can be performed, restrict control panel access to trusted users only and limit the use of the impersonation feature to essential cases with strict monitoring. Implement strong authentication mechanisms and session management to reduce the risk of session hijacking. Conduct regular audits of user permissions and control panel activity logs to detect suspicious behavior. Additionally, apply web application firewall (WAF) rules that can detect and block common XSS payload patterns targeting the control panel. Educate administrators about the risks of impersonation and encourage cautious use of this feature. Finally, ensure that input validation and output encoding best practices are followed in custom plugins or extensions to prevent similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Brazil
CVE-2026-32612: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
Description
CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability in Statamic CMS versions 6. 0. 0 up to but not including 6. 6. 2. It affects the control panel color mode preference feature, allowing authenticated users with control panel access to inject malicious JavaScript. This script executes when a higher-privileged user impersonates the compromised account, potentially leading to session hijacking or privilege escalation. The vulnerability requires authentication and user interaction (impersonation). It has a CVSS score of 5. 4 (medium severity) and was fixed in version 6.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability identified in the Statamic content management system (CMS), which is built on Laravel and Git. The vulnerability exists in the control panel's color mode preference feature, where improper neutralization of input allows an authenticated user with control panel access to inject malicious JavaScript code. This malicious script is stored persistently and executes when a higher-privileged user impersonates the attacker’s account within the control panel. The attack vector requires the attacker to have at least low-level authenticated access to the control panel and relies on user interaction, specifically the impersonation feature, to trigger the payload. The vulnerability affects all Statamic CMS versions from 6.0.0 up to but not including 6.6.2, where the issue has been patched. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss, such as session hijacking, unauthorized actions, or further privilege escalation within the CMS environment. No public exploits have been reported to date, but the vulnerability’s presence in a widely used CMS component makes it a notable risk for organizations relying on Statamic for content management.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with low-level authenticated access to inject malicious JavaScript that executes in the context of higher-privileged users during impersonation. This can lead to session hijacking, theft of sensitive information, unauthorized actions within the CMS, and possible privilege escalation. Organizations using affected Statamic versions risk compromise of their CMS control panels, which could lead to website defacement, data leakage, or further infiltration into internal networks. Since the vulnerability requires authentication and user interaction, the attack surface is somewhat limited; however, in environments where multiple users have control panel access or impersonation is frequently used, the risk is elevated. The vulnerability does not affect availability directly but compromises confidentiality and integrity. Given Statamic’s use in various industries for content management, the impact can be significant, especially for organizations with sensitive or high-profile web content.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Statamic CMS to version 6.6.2 or later, where the issue is patched. Until the upgrade can be performed, restrict control panel access to trusted users only and limit the use of the impersonation feature to essential cases with strict monitoring. Implement strong authentication mechanisms and session management to reduce the risk of session hijacking. Conduct regular audits of user permissions and control panel activity logs to detect suspicious behavior. Additionally, apply web application firewall (WAF) rules that can detect and block common XSS payload patterns targeting the control panel. Educate administrators about the risks of impersonation and encourage cautious use of this feature. Finally, ensure that input validation and output encoding best practices are followed in custom plugins or extensions to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-12T14:54:24.270Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b3375b2f860ef943024599
Added to database: 3/12/2026, 9:59:55 PM
Last enriched: 3/20/2026, 2:29:13 AM
Last updated: 4/27/2026, 2:00:07 AM
Views: 137
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.