CVE-2024-26483
Description
An arbitrary file upload vulnerability in the Profile Image module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted PDF file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Kirby CMS 4.1.0 arbitrary file upload via Profile Image module allows authenticated users to upload non-image files like PDFs, potentially enabling XSS.
Vulnerability
Overview
CVE-2024-26483 affects Kirby CMS versions prior to 4.1.1, specifically the Profile Image module. The backend fails to validate file extensions or MIME types of uploaded avatar images, allowing authenticated Panel users to upload files with non-image extensions such as PDF. While dangerous file types like HTML or PHP are blocked, the upload mechanism does not enforce that the file is an actual image [1][2].
Exploitation
The attack requires an authenticated user with Panel access. The user can upload a crafted file via their own account's avatar upload feature. The file is stored with the filename profile and the attacker-provided extension, making it accessible via a direct URL. This attack cannot be automated and requires user interaction (the attacker must be a logged-in user) [2].
Impact
Although the advisory states the vulnerability does not directly enable remote code execution (RCE), it allows uploading unexpected file types (e.g., PDFs) that can then be shared with other users. This could be abused for cross-site scripting (XSS) if the uploaded file contains malicious JavaScript that executes in a victim's browser when the file is accessed or processed [2].
Mitigation
The vulnerability has been patched in Kirby versions 3.6.6.5, 3.7.5.4, 3.8.4.3, 3.9.8.1, 3.10.0.1, and 4.1.1. The fix adds validation to reject any file that does not have an image file extension or MIME type. All users should update to one of these patched versions immediately [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
getkirby/cmsPackagist | < 3.6.6.5 | 3.6.6.5 |
getkirby/cmsPackagist | >= 3.7.0, < 3.7.5.4 | 3.7.5.4 |
getkirby/cmsPackagist | >= 3.8.0, < 3.8.4.3 | 3.8.4.3 |
getkirby/cmsPackagist | >= 3.9.0, < 3.9.8.1 | 3.9.8.1 |
getkirby/cmsPackagist | >= 3.10.0, < 3.10.0.1 | 3.10.0.1 |
getkirby/cmsPackagist | >= 4.0.0, < 4.1.1 | 4.1.1 |
Affected products
2- Kirby/CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.