Description
Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. This issue has been fixed in 6.3.2 and 5.73.9.
Published: 2026-02-21
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Stored XSS
Action: Apply Patch
AI Analysis

Impact

Statamic CMS versions 5.73.8 and earlier, and 6.0.0‑alpha.1 through 6.3.1, contain a stored cross‑site scripting flaw in html fieldtypes. Authenticated users who possess field‑management permissions can embed malicious JavaScript into content. When higher‑privileged users view the compromised content, the injected script runs with the victim’s privileges, enabling actions such as session hijacking, data theft, or further system compromise.

Affected Systems

The affected product is the Statamic content‑management system. Vulnerable releases include 5.73.8 and all prior 5.x versions, as well as every 6.x release up to and including 6.3.1. The flaw was addressed in 5.73.9 and 6.3.2.

Risk and Exploitability

The flaw is assigned a CVSS score of 8.1 and an EPSS score of less than 1 %, indicating a high severity but a low probability of malicious exploitation at present. It is not listed in the CISA KEV catalog. Exploitation requires an authenticated account with field‑management permissions; the attacker injects the payload via the CMS UI. The payload then executes in the browser session of any higher‑privileged user who views the affected page, allowing the attacker to elevate privileges indirectly. Because the attack vector is access through normal CMS operations and the primary requirement is a legitimate account with certain permissions, the path to exploitation is limited but feasible for insiders or compromised accounts.

Generated by OpenCVE AI on April 17, 2026 at 16:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Statamic installation to at least version 5.73.9 or 6.3.2 where the vulnerability is fixed.
  • Restrict the ability to manage html fieldtypes to trusted users only, dropping field‑management permissions from accounts that do not need it.
  • Audit and sanitize existing content for injected scripts, then remove or neutralize any discovered malicious code.

Generated by OpenCVE AI on April 17, 2026 at 16:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8r7r-f4gm-wcpq Statamic affected by privilege escalation via stored cross-site scripting
History

Mon, 30 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Statamic statamic
CPEs cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*
Vendors & Products Statamic statamic

Wed, 25 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Statamic
Statamic cms
Vendors & Products Statamic
Statamic cms

Sat, 21 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. This issue has been fixed in 6.3.2 and 5.73.9.
Title Statamic affected by privilege escalation via stored Cross-site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T18:59:19.390Z

Reserved: 2026-02-18T19:47:02.154Z

Link: CVE-2026-27196

cve-icon Vulnrichment

Updated: 2026-02-24T18:59:12.355Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T05:17:29.333

Modified: 2026-03-30T15:22:05.160

Link: CVE-2026-27196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses