CVE-2026-23493

8.6 HIGH

📋 TL;DR

Pimcore versions before 12.3.1 and 11.5.14 store sensitive information like database passwords and session cookies in the http_error_log file, which can be accessed through the Pimcore backend. This allows attackers to potentially steal credentials and escalate privileges. All Pimcore installations using vulnerable versions are affected.

💻 Affected Systems

Products:
  • Pimcore
Versions: All versions before 12.3.1 and 11.5.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Pimcore installations are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through stolen database credentials leading to data exfiltration, privilege escalation, and complete control over the Pimcore instance.

🟠

Likely Case

Session hijacking and unauthorized access to sensitive data stored in the Pimcore system.

🟢

If Mitigated

Limited impact if logs are properly secured and access to the backend is restricted to authorized users only.

🌐 Internet-Facing: HIGH - If the Pimcore backend is internet-accessible, attackers can directly exploit this vulnerability.
🏢 Internal Only: MEDIUM - Requires internal network access or compromised credentials to exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Pimcore backend interface, which typically requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.3.1 or 11.5.14

Vendor Advisory: https://github.com/pimcore/pimcore/security/advisories/GHSA-q433-j342-rp9h

Restart Required: No

Instructions:

1. Backup your Pimcore installation and database. 2. Update to Pimcore 12.3.1 (for v12) or 11.5.14 (for v11). 3. Verify the update completed successfully. 4. Clear any cached data if necessary.

🔧 Temporary Workarounds

Restrict access to http_error_log file

linux

Set proper file permissions to prevent unauthorized access to the log file.

chmod 600 /path/to/pimcore/var/log/http_error.log
chown www-data:www-data /path/to/pimcore/var/log/http_error.log

Disable logging of sensitive data

all

Modify Pimcore configuration to exclude $_COOKIE and $_SERVER from error logs.

🧯 If You Can't Patch

  • Restrict access to the Pimcore backend to only trusted IP addresses and users.
  • Regularly monitor and audit access to the http_error_log file for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check your Pimcore version; if it's below 12.3.1 (for v12) or 11.5.14 (for v11), you are vulnerable.

Check Version:

php bin/console pimcore:version

Verify Fix Applied:

After updating, verify the version is 12.3.1 or 11.5.14 and check that the http_error_log no longer contains $_COOKIE or $_SERVER data.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to the http_error_log file
  • Suspicious reads of the log file from non-admin users

Network Indicators:

  • Unusual traffic patterns to the Pimcore backend interface

SIEM Query:

source="pimcore" AND (event="file_access" AND file="*http_error.log*")

🔗 References

📤 Share & Export