Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32612: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms

0
Medium
VulnerabilityCVE-2026-32612cvecve-2026-32612cwe-79
Published: Thu Mar 12 2026 (03/12/2026, 21:47:21 UTC)
Source: CVE Database V5
Vendor/Project: statamic
Product: cms

Description

CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability in Statamic CMS versions 6. 0. 0 up to but not including 6. 6. 2. It affects the control panel color mode preference feature, allowing authenticated users with control panel access to inject malicious JavaScript. This script executes when a higher-privileged user impersonates the compromised account, potentially leading to session hijacking or privilege escalation. The vulnerability requires authentication and user interaction (impersonation). It has a CVSS score of 5. 4 (medium severity) and was fixed in version 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:29:13 UTC

Technical Analysis

CVE-2026-32612 is a stored cross-site scripting (XSS) vulnerability identified in the Statamic content management system (CMS), which is built on Laravel and Git. The vulnerability exists in the control panel's color mode preference feature, where improper neutralization of input allows an authenticated user with control panel access to inject malicious JavaScript code. This malicious script is stored persistently and executes when a higher-privileged user impersonates the attacker’s account within the control panel. The attack vector requires the attacker to have at least low-level authenticated access to the control panel and relies on user interaction, specifically the impersonation feature, to trigger the payload. The vulnerability affects all Statamic CMS versions from 6.0.0 up to but not including 6.6.2, where the issue has been patched. The CVSS 3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, privileges required, and user interaction needed. The impact includes potential confidentiality and integrity loss, such as session hijacking, unauthorized actions, or further privilege escalation within the CMS environment. No public exploits have been reported to date, but the vulnerability’s presence in a widely used CMS component makes it a notable risk for organizations relying on Statamic for content management.

Potential Impact

The primary impact of this vulnerability is the potential for attackers with low-level authenticated access to inject malicious JavaScript that executes in the context of higher-privileged users during impersonation. This can lead to session hijacking, theft of sensitive information, unauthorized actions within the CMS, and possible privilege escalation. Organizations using affected Statamic versions risk compromise of their CMS control panels, which could lead to website defacement, data leakage, or further infiltration into internal networks. Since the vulnerability requires authentication and user interaction, the attack surface is somewhat limited; however, in environments where multiple users have control panel access or impersonation is frequently used, the risk is elevated. The vulnerability does not affect availability directly but compromises confidentiality and integrity. Given Statamic’s use in various industries for content management, the impact can be significant, especially for organizations with sensitive or high-profile web content.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Statamic CMS to version 6.6.2 or later, where the issue is patched. Until the upgrade can be performed, restrict control panel access to trusted users only and limit the use of the impersonation feature to essential cases with strict monitoring. Implement strong authentication mechanisms and session management to reduce the risk of session hijacking. Conduct regular audits of user permissions and control panel activity logs to detect suspicious behavior. Additionally, apply web application firewall (WAF) rules that can detect and block common XSS payload patterns targeting the control panel. Educate administrators about the risks of impersonation and encourage cautious use of this feature. Finally, ensure that input validation and output encoding best practices are followed in custom plugins or extensions to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.270Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3375b2f860ef943024599

Added to database: 3/12/2026, 9:59:55 PM

Last enriched: 3/20/2026, 2:29:13 AM

Last updated: 4/27/2026, 3:28:17 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses