Cyber Posture

CVE-2026-41175

High

Published: 22 April 2026

Published
22 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0009 24.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41175 is a high-severity Unsafe Reflection (CWE-470) vulnerability in Statamic Statamic. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates externally-controlled query parameters, REST API inputs, and GraphQL arguments to prevent manipulation resulting in unauthorized deletions.

prevent

Ensures timely remediation of the specific flaw in Statamic CMS by patching to versions 5.73.20 or 6.13.0, eliminating the vulnerability.

prevent

Enforces least privilege to restrict low-permission Control Panel users from performing destructive actions even if input manipulation occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1531 Account Access Removal Impact
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.
Why these techniques?

Vulnerability in public-facing Statamic CMS enables exploitation via parameter manipulation on Control Panel/API/GraphQL endpoints for unauthorized deletion of content/assets (T1190 + T1485) and user accounts (T1531).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.20 and 6.13.0, manipulating query parameters on Control Panel and REST API endpoints, or arguments in GraphQL queries, could result in the loss of content, assets,…

more

and user accounts. The Control Panel requires authentication with minimal permissions in order to exploit. e.g. "view entries" permission to delete entries, or "view users" permission to delete users, etc. The REST and GraphQL API exploits do not require any permissions, however neither are enabled by default. In order to be exploited, they would need to be explicitly enabled with no authentication configured, and the specific resources enabled too. Sites that enable the REST or GraphQL API without authentication should treat patching as critical priority. This has been fixed in 5.73.20 and 6.13.0.

Deeper analysisAI

CVE-2026-41175 is a vulnerability in Statamic, a Laravel and Git-powered content management system (CMS), affecting versions prior to 5.73.20 and 6.13.0. It stems from CWE-470 (Use of Externally-Controlled Input to Select Classes or Code) and allows attackers to manipulate query parameters on Control Panel endpoints, REST API endpoints, or arguments in GraphQL queries. This manipulation can result in the deletion of content, assets, and user accounts. The issue has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and significant impacts on integrity and availability.

Attackers can exploit this vulnerability in different ways depending on the endpoint. For Control Panel endpoints, an authenticated user with minimal permissions—such as "view entries" to delete entries or "view users" to delete users—can perform destructive actions remotely. REST API and GraphQL exploits require no permissions or authentication but are not enabled by default; they demand explicit configuration without authentication and enabling specific resources. Successful exploitation leads to unauthorized deletion of site content, assets, and user accounts.

The Statamic security advisory at https://github.com/statamic/cms/security/advisories/GHSA-4jjr-vmv7-wh4w details the fix in versions 5.73.20 and 6.13.0. Sites enabling REST or GraphQL APIs without authentication should prioritize patching as critical, while others should update promptly to mitigate risks from low-privilege Control Panel users.

Details

CWE(s)

Affected Products

statamic
statamic
≤ 5.73.20 · 6.0.0 — 6.13.0

CVEs Like This One

CVE-2026-28425Same product: Statamic Statamic
CVE-2026-25759Same product: Statamic Statamic
CVE-2026-27593Same product: Statamic Statamic
CVE-2026-28423Same product: Statamic Statamic
CVE-2026-33172Same product: Statamic Statamic
CVE-2026-28426Same product: Statamic Statamic
CVE-2026-27939Same product: Statamic Statamic
CVE-2026-27196Same product: Statamic Statamic
CVE-2025-53693Shared CWE-470
CVE-2025-63690Shared CWE-470

References