Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-28425

Statamic vulnerable to remote code execution via Antlers-enabled control panel inputs
Back to all
CVE

CVE-2026-28425

Statamic vulnerable to remote code execution via Antlers-enabled control panel inputs

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, an authenticated control panel user with access to Antlers-enabled inputs may be able to achieve remote code execution in the application context. That can lead to full compromise of the application, including access to sensitive configuration, modification or exfiltration of data, and potential impact on availability. Exploitation is only possible where Antlers runs on user-controlled content—for example, content fields with Antlers explicitly enabled (requiring permission to configure fields and to edit entries), built-in config that supports Antlers such as Forms email notification settings (requiring configuration permission), or third-party addons that add Antlers-enabled fields to entries (for example, the SEO Pro addon). In each case the attacker must have the relevant control panel permissions. This has been fixed in 5.73.16 and 6.7.2. Users of addons that depend on Statamic should ensure that after updating they are running a patched Statamic version.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/statamic/cms/releases/tag/v5.73.11, https://github.com/statamic/cms/releases/tag/v6.4.0, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28425.json, https://github.com/statamic/cms/security/advisories/GHSA-cpv7-q2wx-m8rw, https://nvd.nist.gov/vuln/detail/CVE-2026-28425

Severity

8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8
EPSS Probability
0.00188%
EPSS Percentile
0.40286%
Introduced Version
0,d1bb31cfa1191226cee2a2d1e17aa4c25541e568
Fix Available
291a660355d8a20a8c49537dcc92bab2ba7e6eb1,0b45b8a5c1537e83a4252d3f7681f2e9572653b0

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading