Impact
Statamic’s revision controllers lacked proper authorization checks prior to versions 5.73.16 and 6.7.2, allowing any authenticated Control Panel user to view or create revisions for collections with revisions enabled irrespective of the user’s collection permissions. This breach exposes private entry data and blueprint definitions to unauthorized users, meaning sensitive content could be read or traced back to its source even though the content remains unpublished. The vulnerability does not permit direct alteration of published data; however, the ability to inspect historical content can aid in reconstructing or leaking confidential information.
Affected Systems
The affected product is Statamic CMS. Any installation running 5.72.x, 5.73.x before 5.73.16, or 6.6.x, 6.7.x before 6.7.2 with revisions enabled is vulnerable. The issue specifically impacts the Control Panel’s revision endpoints, which bypass collection permission checks.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely in the near term. The vulnerability requires an authenticated user with Control Panel access; it is not publicly exploitable from the network. Because the issue only permits unauthorized reading of revision data rather than altering or publishing content, the overall risk is moderate, but it is still a legitimate concern for sites handling sensitive or confidential information.
OpenCVE Enrichment
Github GHSA