Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. CVE-2026-40099

CVE-2026-40099: Kirby's page creation API bypasses the changeStatus permission check via unfiltered isDraft parameter

April 23, 2026 (updated April 27, 2026)

Kirby’s user permissions control which user role is allowed to perform specific actions to content models in the CMS. These permissions are defined for each role in the user blueprint (site/blueprints/users/...). It is also possible to customize the permissions for each target model in the model blueprints (such as in site/blueprints/pages/...) using the options feature. The permissions and options together control the authorization of user actions.

For pages, Kirby provides the pages.create and pages.changeStatus permissions (among others). In affected releases, Kirby checked these permissions independently and only for the respective action. However the changeStatus permission didn’t take effect on page creation.

New pages are created as drafts by default and need to be published by changing the page status of an existing page draft. This is ensured when the page is created via the Kirby Panel. However the REST API allows to override the isDraft flag when creating a new page. This allowed authenticated attackers with the pages.create permission to immediately create published pages, bypassing the normal editorial workflow.

References

  • github.com/advisories/GHSA-w942-j9r6-hr6r
  • github.com/getkirby/kirby
  • github.com/getkirby/kirby/releases/tag/4.9.0
  • github.com/getkirby/kirby/releases/tag/5.4.0
  • github.com/getkirby/kirby/security/advisories/GHSA-w942-j9r6-hr6r
  • nvd.nist.gov/vuln/detail/CVE-2026-40099

Code Behaviors & Features

Detect and mitigate CVE-2026-40099 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.9.0, all versions starting from 5.0.0 before 5.4.0

Fixed versions

  • 4.9.0
  • 5.4.0

Solution

Upgrade to versions 4.9.0, 5.4.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

packagist/getkirby/cms/CVE-2026-40099.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:25 +0000.