CVE-2026-25759

8.7 HIGH

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in Statmatic CMS allows authenticated users with content creation permissions to inject malicious JavaScript into content titles. When higher-privileged users view these titles, the script executes, potentially allowing attackers to create super admin accounts. This affects Statmatic CMS versions 6.0.0 through 6.2.2.

💻 Affected Systems

Products:
  • Statmatic CMS
Versions: 6.0.0 to 6.2.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with content creation permissions; Laravel-based installations are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain super admin privileges, leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Privilege escalation where attackers create unauthorized admin accounts to modify content, access sensitive data, or install backdoors.

🟢

If Mitigated

Limited impact with proper input validation and output encoding preventing script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once permissions are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.3

Vendor Advisory: https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8

Restart Required: No

Instructions:

1. Backup your Statmatic installation. 2. Update to version 6.2.3 via composer: 'composer require statamic/cms:^6.2.3'. 3. Clear Laravel cache: 'php artisan cache:clear'. 4. Verify the update with 'composer show statamic/cms'.

🔧 Temporary Workarounds

Input Sanitization

all

Implement server-side validation to strip or encode HTML/JavaScript from content titles.

Content Title Filtering

all

Add middleware to sanitize title inputs before storage.

🧯 If You Can't Patch

  • Restrict content creation permissions to trusted users only.
  • Implement web application firewall (WAF) rules to block XSS payloads in title fields.

🔍 How to Verify

Check if Vulnerable:

Check Statmatic version via 'composer show statamic/cms' or review package.json; versions 6.0.0-6.2.2 are vulnerable.

Check Version:

composer show statamic/cms | grep versions

Verify Fix Applied:

Confirm version is 6.2.3 or higher with 'composer show statamic/cms' and test title fields for XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content title modifications, especially with script tags or JavaScript code.

Network Indicators:

  • HTTP requests with suspicious payloads in title parameters.

SIEM Query:

source="web_logs" AND (title CONTAINS "<script>" OR title CONTAINS "javascript:")

🔗 References

📤 Share & Export