CVE-2023-47129: Statamic CMS remote code execution via front-end form uploads
8.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.87532%
CWE
Published
11/12/2023
Updated
11/12/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
statamic/cms | composer | >= 4.0.0, < 4.33.0 | 4.33.0 |
statamic/cms | composer | < 3.4.13 | 3.4.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient file extension validation in front-end form asset uploads. The patch in commit 098ef80 modifies the extraRules
method to add a closure validator that explicitly blocks .php
, .php3
, .php4
, .php5
, and .phtml
extensions. The original code only enforced a generic 'file' validation rule (line 167 in the diff), which relied on MIME-type validation that could be spoofed. The vulnerable function
was responsible for defining these validation rules, making it the root cause of the unrestricted upload vulnerability.