Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. CVE-2026-42069

CVE-2026-42069: Kirby CMS's read access to site, user and role information is not gated by permissions

May 4, 2026

Kirby’s user permissions control which user role is allowed to perform specific actions to content models in the CMS. These permissions are defined for each role in the user blueprint (site/blueprints/users/...). It is also possible to customize the permissions for each target model in the model blueprints (such as in site/blueprints/pages/...) using the options feature. The permissions and options together control the authorization of user actions.

In affected releases, Kirby did not provide permission settings that control the access to the site model as well as to users and user roles. If the site developer disabled all permissions via the wildcard "*": false setting, this only disabled the actions that were explicitly gated by existing permissions.

To be specific, the following permissions were missing in affected releases and have been added in the patches:

  • site.access
  • user.access and users.access (for the own user and other users respectively)
  • user.list and users.list (for the own user and other users respectively)

Access to role information such as the list of existing roles, their names and descriptions as well as their configured permissions were also not gated by user-based permissions.

References

  • github.com/advisories/GHSA-2h7v-4372-f6x2
  • github.com/getkirby/kirby
  • github.com/getkirby/kirby/releases/tag/4.9.0
  • github.com/getkirby/kirby/releases/tag/5.4.0
  • github.com/getkirby/kirby/security/advisories/GHSA-2h7v-4372-f6x2
  • nvd.nist.gov/vuln/detail/CVE-2026-42069

Code Behaviors & Features

Detect and mitigate CVE-2026-42069 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.9.0, all versions starting from 5.0.0 before 5.4.0

Fixed versions

  • 4.9.0
  • 5.4.0

Solution

Upgrade to versions 4.9.0, 5.4.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

packagist/getkirby/cms/CVE-2026-42069.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:51 +0000.