Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. CVE-2026-42051

CVE-2026-42051: Kirby CMS's system API endpoint leaks installed version and license data to authenticated users

May 4, 2026

Kirby’s user permissions control which user role is allowed to perform specific actions in the CMS. These permissions are defined for each role in the user blueprint (site/blueprints/users/...). The permissions control the authorization of user actions (with handling of model-specific authorization omitted here for brevity).

Kirby provides the access.system permission (among others) that controls access to the system area of the Kirby Panel. This area contains internal system information like the installed Kirby, plugin and server versions, security state and Kirby license. If the access.system permission is disabled for a user role, users of that role should not be able to access this internal system information. However it is also possible to access some system information via the /api/system REST API endpoint. In affected releases, the response of this endpoint for authenticated users contained the installed Kirby version and the status, type and code of the installed Kirby license. These values are considered sensitive information and should be protected by the access.system permission.

The installed Kirby version and license data can be used by malicious actors during reconnaissance when planning a separate attack.

References

  • github.com/advisories/GHSA-x68m-c7jf-2572
  • github.com/getkirby/kirby
  • github.com/getkirby/kirby/releases/tag/4.9.0
  • github.com/getkirby/kirby/releases/tag/5.4.0
  • github.com/getkirby/kirby/security/advisories/GHSA-x68m-c7jf-2572
  • nvd.nist.gov/vuln/detail/CVE-2026-42051

Code Behaviors & Features

Detect and mitigate CVE-2026-42051 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.9.0, all versions starting from 5.0.0 before 5.4.0

Fixed versions

  • 4.9.0
  • 5.4.0

Solution

Upgrade to versions 4.9.0, 5.4.0 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

packagist/getkirby/cms/CVE-2026-42051.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:17 +0000.