CVE-2026-33883
Received Received - Intake
Cross-Site Scripting in Statamic user:reset_password_form Tag

Publication date: 2026-03-27

Last updated on: 2026-04-08

Assigner: GitHub, Inc.

Description
Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, the `user:reset_password_form` tag could render user-input directly into HTML without escaping, allowing an attacker to craft a URL that executes arbitrary JavaScript in the victim's browser. This has been fixed in 5.73.16 and 6.7.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-03-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
statamic statamic to 5.73.16 (exc)
statamic statamic From 6.0.0 (inc) to 6.7.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a reflected Cross-Site Scripting (XSS) flaw that allows execution of arbitrary JavaScript in a victim's browser, potentially leading to limited data exposure and modification.

Such vulnerabilities can impact compliance with standards like GDPR and HIPAA because they may lead to unauthorized access or manipulation of personal or sensitive data, violating requirements for data protection and integrity.

However, the confidentiality and integrity impacts are rated as low, and there is no impact on availability.

Organizations using affected versions of Statamic CMS should apply the patches to mitigate risks and maintain compliance with relevant data protection regulations.


Can you explain this vulnerability to me?

CVE-2026-33883 is a reflected Cross-Site Scripting (XSS) vulnerability in the Statamic CMS package affecting versions prior to 5.73.16 and 6.7.2.

The vulnerability arises because the `user:reset_password_form` tag improperly renders user-supplied input from the redirect parameter directly into HTML without proper escaping.

This flaw allows an attacker to craft a malicious URL that executes arbitrary JavaScript code in the victim’s browser when the password reset form is accessed.

It has been fixed in versions 5.73.16 and 6.7.2 by properly escaping the redirect parameter to prevent script injection.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to execute arbitrary JavaScript in the browser of anyone who clicks a specially crafted malicious URL.

The attack requires no authentication and can be performed remotely over the network.

The potential impacts include limited exposure of confidential information and limited modification of data due to the script execution.

However, it does not affect the availability of the service.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the user:reset_password_form tag in Statamic CMS rendering user input from the redirect parameter without proper escaping, leading to reflected Cross-Site Scripting (XSS). Detection can involve checking if your Statamic CMS version is prior to 5.73.16 or 6.7.2.

To detect exploitation attempts on your network or system, you can monitor HTTP requests for suspicious URLs containing the user:reset_password_form tag with unusual or encoded JavaScript payloads in the redirect parameter.

Example commands to detect such attempts might include searching web server logs for the vulnerable URL pattern and suspicious script content:

  • grep -i 'user:reset_password_form' /var/log/apache2/access.log
  • grep -i 'redirect=' /var/log/apache2/access.log | grep -E '<script|%3Cscript'

Additionally, using web vulnerability scanners or tools that detect reflected XSS by testing the redirect parameter in the password reset form URL can help identify the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade your Statamic CMS installation to version 5.73.16 or 6.7.2 or later, where the vulnerability has been fixed by properly escaping the redirect parameter.

Until you can upgrade, consider implementing web application firewall (WAF) rules to block requests containing suspicious script payloads in the redirect parameter of the user:reset_password_form.

Also, educate users to avoid clicking on suspicious password reset links and monitor your logs for exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart