CVE-2026-41175
Description
Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.20 and 6.13.0, manipulating query parameters on Control Panel and REST API endpoints, or arguments in GraphQL queries, could result in the loss of content, assets, and user accounts. The Control Panel requires authentication with minimal permissions in order to exploit. e.g. "view entries" permission to delete entries, or "view users" permission to delete users, etc. The REST and GraphQL API exploits do not require any permissions, however neither are enabled by default. In order to be exploited, they would need to be explicitly enabled with no authentication configured, and the specific resources enabled too. Sites that enable the REST or GraphQL API without authentication should treat patching as critical priority. This has been fixed in 5.73.20 and 6.13.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
statamic/cmsPackagist | < 5.73.20 | 5.73.20 |
statamic/cmsPackagist | >= 6.0.0-alpha.1, < 6.13.0 | 6.13.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4jjr-vmv7-wh4wghsaADVISORY
- github.com/statamic/cms/security/advisories/GHSA-4jjr-vmv7-wh4wnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-41175ghsaADVISORY
News mentions
0No linked articles in our index yet.