CVE-2020-26255:
Kirby Panel users could upload PHP Phar archives as content files before v2.5.14 and v3.4.5
6.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.77145%
CWE
Published
12/8/2020
Updated
1/11/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
getkirby/panel | composer | < 2.5.14 | 2.5.14 |
getkirby/cms | composer | >= 3.0.0, < 3.4.5 | 3.4.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient file type validation in the checkUpload()
function. The commit diff shows 'phar' was added to the forbidden extensions array ($forbiddenExtensions) and the extension check condition (str::contains
) was updated to include 'phar'. Prior to the patch, this function did not block .phar
files, enabling the upload of executable PHP
archives. The function's role in file validation directly maps to CWE-434
(Unrestricted Upload of Dangerous File Type), and the patch explicitly addresses this gap.