Impact
The vulnerability allows an Editor to inject PHP INI variable patterns such as ${APP_KEY} or ${DB_PASSWORD} into page settings. PHP’s parse_ini_string() resolves these patterns, causing the CMS to store and later return sensitive environment variables within a template. This results in the exfiltration of credentials and secrets like database passwords, AWS keys, and application keys, potentially enabling subsequent attacks such as database compromise or cookie forgery.
Affected Systems
OctoberCMS (October CMS) versions earlier than 3.7.14 and 4.1.10 are affected when cms.safe_mode is enabled. The issue requires Editor role access and is confined to the settings parser in these CMS releases.
Risk and Exploitability
The CVSS score of 4.9 indicates a moderate risk. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires legitimate Editor access in a system running cms.safe_mode, after which an attacker can retrieve environment variables that may be used for further credential‑based attacks. The vulnerability does not grant arbitrary code execution.
OpenCVE Enrichment
Github GHSA