Plataforma
php
Componente
statamic/cms
Corrigido em
6.0.1
5.73.15
6.7.0
CVE-2026-33172 describes a stored Cross-Site Scripting (XSS) vulnerability within the Statamic CMS asset reupload functionality. This vulnerability allows authenticated users possessing asset upload permissions to bypass the intended SVG sanitization measures. Successful exploitation can lead to the injection and execution of malicious JavaScript code when the affected asset is viewed, potentially compromising user sessions and site integrity. The vulnerability impacts Statamic CMS versions up to 6.6.3, and a fix is available in version 6.7.0.
The impact of this XSS vulnerability is significant, particularly within environments where asset uploads are frequently handled by authenticated users. An attacker could leverage this flaw to inject malicious JavaScript into SVG assets, which would then execute in the browsers of users viewing those assets. This could lead to a variety of attacks, including session hijacking, defacement of the website, redirection to malicious sites, and theft of sensitive user data. The attacker's ability to bypass SVG sanitization highlights a critical failure in the CMS's security controls, making it easier to inject harmful code. Given the widespread use of CMS platforms and the potential for large-scale impact, this vulnerability warrants immediate attention.
CVE-2026-33172 was publicly disclosed on 2026-03-18. Currently, there is no indication of active exploitation campaigns targeting this vulnerability. No public proof-of-concept (PoC) code has been released. The vulnerability has not been added to the CISA KEV catalog. The CVSS score of 8.7 (HIGH) reflects the potential for significant impact if exploited.
Organizations using Statamic CMS with asset upload functionality enabled are at risk. This includes websites with user-generated content, e-commerce platforms allowing users to upload product images, and any site where authenticated users can upload SVG assets. Specifically, those running Statamic CMS versions prior to 6.7.0 are vulnerable.
• php / server:
find /var/www/statamic/assets -name '*.svg' -print0 | xargs -0 grep -i '<script' |• php / server:
journalctl -u php-fpm -f | grep -i "SVG sanitization bypass"• generic web: Check asset directories for suspicious SVG files with obfuscated JavaScript code. • generic web: Review access logs for requests containing SVG files with unusual parameters or user agents.
disclosure
Status do Exploit
EPSS
0.01% (percentil 1%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2026-33172 is to upgrade Statamic CMS to version 6.7.0 or later, which includes the necessary fixes to prevent SVG sanitization bypass. If an immediate upgrade is not feasible due to compatibility concerns or breaking changes, consider implementing temporary workarounds. These may include restricting SVG uploads entirely, implementing stricter input validation on uploaded files, or utilizing a Web Application Firewall (WAF) with rules to detect and block malicious SVG content. Review existing asset upload processes and ensure proper validation and sanitization of all uploaded files. After upgrading, confirm the fix by attempting to upload a crafted SVG file containing a simple JavaScript payload (e.g., an alert box) and verifying that the payload is not executed.
Actualice Statamic a la versión 5.73.14 o 6.7.0 o superior. Esto corrige la vulnerabilidad XSS almacenada en la sanitización de SVG. La actualización evitará la inyección de JavaScript malicioso al visualizar los assets.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2026-33172 is a stored XSS vulnerability in Statamic CMS, allowing authenticated users to inject malicious JavaScript through SVG asset reuploads.
You are affected if you are using Statamic CMS versions 6.6.3 or earlier. Upgrade to version 6.7.0 to mitigate the risk.
Upgrade Statamic CMS to version 6.7.0 or later. As a temporary workaround, restrict SVG uploads or implement stricter input validation.
There is currently no evidence of active exploitation, but the vulnerability's high severity warrants prompt remediation.
Please refer to the Statamic security advisory for detailed information and updates: [https://statamic.com/security/advisories](https://statamic.com/security/advisories)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.