CVE-2026-29905
Received Received - Intake
Persistent DoS via Malformed Image Upload in Kirby CMS Editor

Publication date: 2026-03-26

Last updated on: 2026-04-02

Assigner: MITRE

Description
Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
getkirby kirby to 5.1.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-252 The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not include any details about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-29905 is a vulnerability in Kirby CMS versions up to 5.1.4 that allows an authenticated user with Editor permissions to cause a persistent Denial of Service (DoS) by uploading a malformed image file.

The issue occurs because Kirby CMS uses PHP's getimagesize() function to process uploaded images but does not properly validate the function's return value. When getimagesize() encounters a malformed image, it returns false instead of an expected array, which leads to a fatal TypeError during thumbnail generation or metadata processing.

This crash persists across page reloads, causing affected pages to return HTTP 500 errors until the problematic file is manually deleted from the filesystem.

The vulnerability is classified under CWE-252 (Unchecked Return Value) and CWE-20 (Improper Input Validation) and has a medium severity rating.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an authenticated user with Editor permissions to cause a persistent Denial of Service (DoS) on your Kirby CMS site.

Specifically, uploading a malformed image file can cause the system to crash with a fatal error, resulting in HTTP 500 errors on affected pages.

This DoS condition persists until the malformed file is manually removed, potentially disrupting site availability and user experience.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying the presence of malformed image files uploaded by authenticated users with Editor permissions that cause Kirby CMS to return HTTP 500 errors on affected pages.

Specifically, pages that attempt to generate thumbnails or process metadata for these images will crash due to a fatal TypeError triggered by PHP's getimagesize() function returning false.

To detect this on your system, you can look for HTTP 500 errors on pages that display images uploaded by Editors and check the filesystem for recently uploaded image files that might be malformed.

  • Check web server logs for repeated HTTP 500 errors related to image processing.
  • Identify recently uploaded image files in the Kirby CMS content directories.
  • Use PHP or command-line tools to test image validity, for example, running a PHP script that calls getimagesize() on suspect files to see if it returns false.
  • Example command to find recently modified image files (Linux): `find /path/to/kirby/content -type f \( -iname '*.jpg' -o -iname '*.png' \) -mtime -7`
  • Example PHP snippet to test an image file: `<?php $info = getimagesize('path/to/image.jpg'); var_dump($info); ?>` If it returns false, the image is malformed.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Kirby CMS to version 5.2.0-rc.1 or later, where this vulnerability has been fixed.

Until the upgrade can be applied, you should restrict or monitor uploads by users with Editor permissions to prevent uploading malformed image files.

If the vulnerability has already been exploited, manually identify and delete the malformed image files causing the fatal errors to restore normal operation.

  • Upgrade Kirby CMS to version 5.2.0-rc.1 or newer.
  • Temporarily restrict image uploads for users with Editor permissions.
  • Manually remove any malformed image files causing HTTP 500 errors.
  • Implement additional validation on image uploads to ensure files are properly formatted before processing.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart