Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. CVE-2026-34587

CVE-2026-34587: Kirby has Server-Side Template Injection (SSTI) via double template resolution in option rendering

April 23, 2026 (updated May 5, 2026)

Kirby provides field types (checkboxes, color, multiselect, select, radio, tags and toggles) that offer a fixed set of options from a configured list. This configured list can be statically defined in the blueprint or it can come from a Kirby query or (external) API source. Options coming from a query or API are treated as dynamic.

Static options can contain queries in the form {{ query }} or {< query >} that are then evaluated to a static value. Because the queries are defined in the blueprint, they can be trusted and cannot be controlled by attackers.

However, dynamic options can often not be trusted. This is why the “options from query” and “options from API” modes are intended to resolve the option values and text strings based on queries not defined within the data source but within the blueprint.

Unfortunately, the results of these trusted queries on untrusted source data are run through the query parser a second time in affected Kirby releases.

Because of the double-resolution of dynamic option values and text strings, attackers could place malicious query templates such as {{ users.first.password }} or {{ page.delete }} in the option sources such as page titles or external API data controlled by the attacker. These queries would then be executed when the field is loaded in the Panel. When the attacker directly accesses the respective Panel view, they could get access to information normally hidden from them. As the malicious query templates are loaded for all users, it could also lead to malicious write access when another user with a higher permission level accesses the manipulated Panel view.

References

  • github.com/advisories/GHSA-jcjw-58rv-c452
  • github.com/getkirby/kirby
  • github.com/getkirby/kirby/releases/tag/4.9.0
  • github.com/getkirby/kirby/releases/tag/5.4.0
  • github.com/getkirby/kirby/security/advisories/GHSA-jcjw-58rv-c452
  • nvd.nist.gov/vuln/detail/CVE-2026-34587

Code Behaviors & Features

Detect and mitigate CVE-2026-34587 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.9.0, all versions starting from 5.0.0 before 5.4.0

Fixed versions

  • 4.9.0
  • 5.4.0

Solution

Upgrade to versions 4.9.0, 5.4.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Source file

packagist/getkirby/cms/CVE-2026-34587.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:33 +0000.