VYPR
Moderate severityNVD Advisory· Published Feb 22, 2024· Updated Apr 22, 2025

CVE-2024-26483

CVE-2024-26483

Description

An arbitrary file upload vulnerability in the Profile Image module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted PDF file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Kirby CMS 4.1.0 arbitrary file upload via Profile Image module allows authenticated users to upload non-image files like PDFs, potentially enabling XSS.

Vulnerability

Overview

CVE-2024-26483 affects Kirby CMS versions prior to 4.1.1, specifically the Profile Image module. The backend fails to validate file extensions or MIME types of uploaded avatar images, allowing authenticated Panel users to upload files with non-image extensions such as PDF. While dangerous file types like HTML or PHP are blocked, the upload mechanism does not enforce that the file is an actual image [1][2].

Exploitation

The attack requires an authenticated user with Panel access. The user can upload a crafted file via their own account's avatar upload feature. The file is stored with the filename profile and the attacker-provided extension, making it accessible via a direct URL. This attack cannot be automated and requires user interaction (the attacker must be a logged-in user) [2].

Impact

Although the advisory states the vulnerability does not directly enable remote code execution (RCE), it allows uploading unexpected file types (e.g., PDFs) that can then be shared with other users. This could be abused for cross-site scripting (XSS) if the uploaded file contains malicious JavaScript that executes in a victim's browser when the file is accessed or processed [2].

Mitigation

The vulnerability has been patched in Kirby versions 3.6.6.5, 3.7.5.4, 3.8.4.3, 3.9.8.1, 3.10.0.1, and 4.1.1. The fix adds validation to reject any file that does not have an image file extension or MIME type. All users should update to one of these patched versions immediately [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
getkirby/cmsPackagist
< 3.6.6.53.6.6.5
getkirby/cmsPackagist
>= 3.7.0, < 3.7.5.43.7.5.4
getkirby/cmsPackagist
>= 3.8.0, < 3.8.4.33.8.4.3
getkirby/cmsPackagist
>= 3.9.0, < 3.9.8.13.9.8.1
getkirby/cmsPackagist
>= 3.10.0, < 3.10.0.13.10.0.1
getkirby/cmsPackagist
>= 4.0.0, < 4.1.14.1.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.