VYPR
High severityNVD Advisory· Published Mar 20, 2026· Updated Mar 25, 2026

Statamic has Stored XSS via SVG Sanitization Bypass

CVE-2026-33172

Description

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and inject malicious JavaScript that executes when the asset is viewed. This has been fixed in 5.73.14 and 6.7.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Statamic via SVG re-upload bypasses sanitization, letting authenticated users inject persistent JavaScript.

Vulnerability

Overview

Statamic, a Laravel and Git powered CMS, is susceptible to a stored cross-site scripting (XSS) vulnerability in its SVG asset re-upload functionality [1]. The root cause is a bypass of the SVG sanitization process: when an authenticated user re-uploads an SVG file, the sanitization check is not properly applied, allowing the file to contain arbitrary JavaScript [1][3].

Exploitation

Prerequisites

An attacker must have valid authentication and possess the 'upload assets' permission within the Statamic control panel [1]. The attack is performed by uploading a specially crafted SVG file that includes malicious JavaScript. Because the sanitization is bypassed on re-upload, the malicous content is stored server-side. No additional user interaction is required for the stored payload to execute when the asset is subsequently viewed in a browser [1][3].

Impact

Successful exploitation leads to persistent JavaScript execution in the context of any user who views the affected SVG asset [1]. This can result in data theft (e.g., session cookies, CSRF tokens), unauthorized actions on behalf of the victim, or defacement. According to the advisory, the attack complexity is high, but the potential impact on confidentiality and integrity is significant due to the stored nature of the payload [3].

Mitigation

The vulnerability has been addressed in Statamic versions 5.73.14 and 6.7.0 [1]. Users running earlier versions are advised to upgrade immediately. No workarounds have been published, and the vendor has not indicated whether the issue is listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
statamic/cmsPackagist
>= 6.0.0-alpha.1, < 6.7.06.7.0
statamic/cmsPackagist
< 5.73.145.73.14

Affected products

2
  • Range: <5.73.14 || <6.7.0
  • statamic/cmsv5
    Range: >= 6.0.0-alpha.1, < 6.7.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.