Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. statamic/cms
  4. ›
  5. GHSA-4jjr-vmv7-wh4w

GHSA-4jjr-vmv7-wh4w: Statamic: Unsafe method invocation via query value resolution allows data destruction

April 16, 2026

Manipulating query parameters on Control Panel and REST API endpoints, or arguments in GraphQL queries, could result in the loss of content, assets, and user accounts.

The Control Panel requires authentication with minimal permissions in order to exploit. e.g. “view entries” permission to delete entries, or “view users” permission to delete users, etc.

The REST and GraphQL API exploits do not require any permissions, however neither are enabled by default. In order to be exploited, they would need to be explicitly enabled with no authentication configured, and the specific resources enabled too.

Sites that enable the REST or GraphQL API without authentication should treat patching as critical priority.

References

  • github.com/advisories/GHSA-4jjr-vmv7-wh4w
  • github.com/statamic/cms
  • github.com/statamic/cms/security/advisories/GHSA-4jjr-vmv7-wh4w

Code Behaviors & Features

Detect and mitigate GHSA-4jjr-vmv7-wh4w with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.73.20, all versions starting from 6.0.0-alpha.1 before 6.13.0

Fixed versions

  • 5.73.20
  • 6.13.0

Solution

Upgrade to versions 5.73.20, 6.13.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Source file

packagist/statamic/cms/GHSA-4jjr-vmv7-wh4w.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:01 +0000.