Description
Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, authenticated Control Panel users could read arbitrary `.json`, `.yaml`, and `.csv` files from the server by manipulating the file dictionary's `filename` configuration parameter in the fieldtype's endpoint. This has been fixed in 5.73.14 and 6.7.0.
Published: 2026-03-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

A path traversal flaw in the Statamic file dictionary fieldtype enables an authenticated Control Panel user to manipulate the filename configuration parameter and read arbitrary .json, .yaml, or .csv files on the server. This vulnerability, classified as CWE-22, results in unauthorized disclosure of sensitive data such as configuration settings or credentials, compromising confidentiality without affecting integrity or availability.

Affected Systems

The issue affects Statamic CMS versions earlier than 5.73.14 and 6.7.0. The affected component is the file dictionary fieldtype within the Control Panel. Administrators running these versions should be aware that any authenticated user can trigger the flaw.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, and the EPSS score is below 1%, meaning exploitation is unlikely in the current threat landscape. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector requires an authenticated Control Panel user to submit a crafted filename to the affected endpoint; the flaw permits read‑only access, making confidentiality the primary concern.

Generated by OpenCVE AI on March 23, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the current Statamic CMS version to determine if it is below 5.73.14 or 6.7.0.
  • Upgrade the CMS to the latest patched release (5.73.14 or newer, 6.7.0 or newer) and verify that the file dictionary fieldtype no longer accepts arbitrary filenames.
  • Restart the application and monitor logs for any attempts to access prohibited files; apply additional access controls if necessary.

Generated by OpenCVE AI on March 23, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qm7r-wwq7-6f85 Statamic has a path traversal in file dictionary fieldtype
History

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Statamic statamic
CPEs cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*
Vendors & Products Statamic statamic

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Statamic
Statamic cms
Vendors & Products Statamic
Statamic cms

Fri, 20 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, authenticated Control Panel users could read arbitrary `.json`, `.yaml`, and `.csv` files from the server by manipulating the file dictionary's `filename` configuration parameter in the fieldtype's endpoint. This has been fixed in 5.73.14 and 6.7.0.
Title Statamic has a path traversal in file dictionary fieldtype
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T21:41:51.358Z

Reserved: 2026-03-17T22:16:36.718Z

Link: CVE-2026-33171

cve-icon Vulnrichment

Updated: 2026-03-23T21:31:38.654Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T22:16:28.820

Modified: 2026-03-23T18:46:31.100

Link: CVE-2026-33171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:34:28Z

Weaknesses