Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6gqr-mx34-wh8r | Kirby is vulnerable to authorization bypass during page, file and user creation via blueprint injection |
Mon, 27 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getkirby
Getkirby kirby |
|
| CPEs | cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Getkirby
Getkirby kirby |
|
| Metrics |
cvssV3_1
|
Fri, 24 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kirby is an open-source content management system. Kirby's user permissions control which user role is allowed to perform specific actions to content models in the CMS. These permissions are defined for each role in the user blueprint (`site/blueprints/users/...`). It is also possible to customize the permissions for each target model in the model blueprints (such as in `site/blueprints/pages/...`) using the `options` feature. The permissions and options together control the authorization of user actions. Kirby provides the `pages.create`, `files.create` and `users.create` permissions (among others). These permissions can again be set in the user blueprint and/or in the blueprint of the target model via `options`. Prior to versions 4.9.0 and 5.4.0, Kirby allowed to override the `options` during the creation of pages, files and users by injecting custom dynamic blueprint configuration into the model data. The injected `options` could include `'create' => true`, which then caused an override of the permissions and options configured by the site developer in the user and model blueprints. The problem has been patched in Kirby 4.9.0 and Kirby 5.4.0. The patched versions have updated the normalization code that is used during the creation of pages, files and users to include a filter for the `blueprint` property. This prevents the injection of dynamic blueprint configuration into the creation request. | |
| Title | Kirby is vulnerable to authorization bypass during page, file and user creation via blueprint injection | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T12:11:41.783Z
Reserved: 2026-04-20T14:01:46.672Z
Link: CVE-2026-41325
Updated: 2026-04-24T12:11:36.571Z
Status : Analyzed
Published: 2026-04-24T01:16:12.427
Modified: 2026-04-27T19:07:45.000
Link: CVE-2026-41325
No data.
OpenCVE Enrichment
Updated: 2026-04-29T00:00:13Z
Github GHSA