CVE-2026-23494

4.3 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in Pimcore's API endpoint for static routes. Authenticated backend users without proper permissions can access sensitive route configurations, potentially exposing custom URL patterns and controller details. This affects Pimcore installations prior to versions 12.3.1 and 11.5.14.

💻 Affected Systems

Products:
  • Pimcore
Versions: All versions prior to 12.3.1 and 11.5.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated backend user access. Static routes configured via backend interface or var/config/staticroutes.php file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map internal application structure, discover hidden endpoints, and potentially chain with other vulnerabilities to gain unauthorized access to sensitive functionality.

🟠

Likely Case

Information disclosure of custom route configurations, potentially revealing internal application architecture and sensitive path patterns.

🟢

If Mitigated

Minimal impact with proper authorization controls and network segmentation limiting access to backend interfaces.

🌐 Internet-Facing: MEDIUM - Requires authenticated backend access, but internet-facing admin interfaces increase exposure.
🏢 Internal Only: MEDIUM - Internal attackers with backend access could exploit this to gather reconnaissance information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated backend access and involves simple API calls to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.3.1 or 11.5.14

Vendor Advisory: https://github.com/pimcore/pimcore/security/advisories/GHSA-m3r2-724c-pwgf

Restart Required: No

Instructions:

1. Update Pimcore to version 12.3.1 (for v12) or 11.5.14 (for v11). 2. Verify the update completed successfully. 3. Test API endpoint authorization controls.

🔧 Temporary Workarounds

Restrict Backend Access

all

Limit access to backend interfaces to authorized personnel only using network controls.

API Endpoint Restriction

all

Implement web application firewall rules to block unauthorized access to /api/static-routes endpoint.

🧯 If You Can't Patch

  • Implement strict access controls for backend users and review user permissions regularly.
  • Monitor API access logs for unauthorized requests to static routes endpoint.

🔍 How to Verify

Check if Vulnerable:

Check Pimcore version via admin interface or by examining the installation directory. Versions below 12.3.1 (for v12) or 11.5.14 (for v11) are vulnerable.

Check Version:

Check Pimcore version in admin dashboard or via composer show pimcore/pimcore

Verify Fix Applied:

After updating, test API endpoint access with a low-privilege backend user account to ensure proper authorization checks are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized GET requests to /api/static-routes endpoint
  • Multiple failed authorization attempts for static routes API

Network Indicators:

  • Unusual API traffic patterns to static routes endpoint from unauthorized users

SIEM Query:

source="pimcore" AND (uri_path="/api/static-routes" OR endpoint="static-routes") AND user_role!="admin"

🔗 References

📤 Share & Export