CVE-2023-48217:
Statamic CMS vulnerable to remote code execution via form uploads
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76564%
CWE
Published
11/14/2023
Updated
11/22/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
statamic/cms | composer | >= 4.0.0, < 4.34.0 | 4.34.0 |
statamic/cms | composer | < 3.4.14 | 3.4.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incomplete file extension validation in three key file upload handlers. All three modified functions used an insufficient list of PHP-related extensions (php, php3-5, phtml) in their in_array() checks, missing php7, php8, and phar. The patch explicitly adds these extensions, confirming these validation closures were the vulnerable points. These functions handle file upload validation for both front-end forms and control panel assets, making them direct vectors for bypassing security controls.