Medium severity6.5NVD Advisory· Published Mar 26, 2026· Updated Apr 2, 2026
CVE-2026-29905
CVE-2026-29905
Description
Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
getkirby/cmsPackagist | < 5.2.0-rc.1 | 5.2.0-rc.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- drive.google.com/file/d/1MwvvSYIwnC8kOIzjycGMQZw4d2K2ef8h/viewnvdExploitWEB
- github.com/advisories/GHSA-cw7v-45wm-mcf2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29905ghsaADVISORY
- github.com/Stalin-143/CVE-2026-29905/security/advisories/GHSA-cw7v-45wm-mcf2ghsaWEB
- github.com/getkirby/kirby/releases/tag/5.2.0-rc.1nvdProductWEB
- github.com/github/advisory-database/pull/7503ghsaWEB
News mentions
0No linked articles in our index yet.