GHSA-4j78-4xrm-cr2f

Suggest an improvement
Source
https://github.com/advisories/GHSA-4j78-4xrm-cr2f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-4j78-4xrm-cr2f/GHSA-4j78-4xrm-cr2f.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4j78-4xrm-cr2f
Aliases
Published
2026-01-08T20:32:05Z
Modified
2026-02-03T03:16:05.615454Z
Severity
  • 5.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Kirby is missing permission checks in the content changes API
Details

TL;DR

This vulnerability affects all Kirby sites where user permissions are configured to prevent specific role(s) from performing write actions, specifically by disabling the update permission with the intent to prevent modifications to site content.

If developers haven't configured any user permissions that deviate from the default of allowing all actions, their site is not affected.


Introduction

Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions.

Permissions for updating content have already existed and could be configured for each model type, but were not enforced by Kirby's API backend code during operations to the changes version.

The changes version is the content version that contains unsaved changes of existing models (pages, users, files or the site).

Impact

The missing permission checks allowed attackers with Panel access to create or discard a changes version or update the content fields in an existing changes version. All of these actions could affect arbitrary models.

This could cause the following impact:

  • Attackers could maliciously create changes versions for all models of the site, creating editing locks that would prevent other authenticated users from making content changes until those locks were cleared.
  • Attackers could update the content in a malicious way, for example by adding defamatory or spam content or by including malicious links or scripts. While this updated content would not immediately be published to the site, an inattentive editor with update permissions could inadvertently publish these changes in the belief that an authorized user has made them.
  • Attackers could discard extensive changes, making editors lose their content work.

Patches

The problem has been patched in Kirby 5.2.2. Please update to this or a later version to fix the vulnerability.

In the mentioned release, we have added checks for the model update permissions that ensure that users without this permission cannot create, edit or discard the changes version of the respective model.

A future Kirby release will add separate edit and save permissions that will make it possible to control write actions to model content more granularly.

Credits

Thanks to Lukas Kleinschmidt (@lukaskleinschmidt) for responsibly reporting the identified issue.

Database specific
{
    "github_reviewed_at": "2026-01-08T20:32:05Z",
    "github_reviewed": true,
    "nvd_published_at": "2026-01-08T18:15:59Z",
    "cwe_ids": [
        "CWE-863"
    ],
    "severity": "MODERATE"
}
References

Affected packages

Packagist / getkirby/cms

Package

Name
getkirby/cms
Purl
pkg:composer/getkirby/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.2.2

Affected versions

5.*
5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.1.0-rc.1
5.1.0
5.1.1
5.1.2
5.1.3
5.1.4
5.2.0-rc.1
5.2.0
5.2.1

Database specific

last_known_affected_version_range
"<= 5.2.1"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-4j78-4xrm-cr2f/GHSA-4j78-4xrm-cr2f.json"