CVE-2026-27593: Statamic is vulnerable to account takeover via password reset link injection
An attacker may leverage a vulnerability in the password reset feature to capture a user’s token and reset the password on their behalf.
The attacker must know the email address of a valid account on the site, and the actual user must blindly click the link in their email even though they didn’t request the reset.
References
- github.com/advisories/GHSA-jxq9-79vj-rgvw
- github.com/statamic/cms
- github.com/statamic/cms/commit/6fdd03324982848e8754f2edd2265262d361714e
- github.com/statamic/cms/commit/78e63dfcf705b116d5ac0f7f7f5a1a69be63d1be
- github.com/statamic/cms/commit/b2be592ddfb588bcb88c9be454f3590e14b145b0
- github.com/statamic/cms/releases/tag/v5.73.10
- github.com/statamic/cms/releases/tag/v6.3.3
- github.com/statamic/cms/security/advisories/GHSA-jxq9-79vj-rgvw
- nvd.nist.gov/vuln/detail/CVE-2026-27593
Code Behaviors & Features
Detect and mitigate CVE-2026-27593 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →