CVE-2026-33887
Received Received - Intake
Authorization Bypass in Statamic CMS Allows Unauthorized Entry Revision Access

Publication date: 2026-03-27

Last updated on: 2026-04-08

Assigner: GitHub, Inc.

Description
Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, authenticated Control Panel users could view entry revisions for any collection with revisions enabled, regardless of whether they had the required collection permissions. This bypasses the authorization checks that the main entry controllers enforce, exposing entry field values and blueprint data. Users could also create entry revisions without edit permission, though this only snapshots the existing content state and does not affect published content. This has been fixed in 5.73.16 and 6.7.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-03-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
statamic statamic to 5.73.16 (exc)
statamic statamic From 6.0.0 (inc) to 6.7.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33887 is a moderate severity vulnerability in the Statamic CMS affecting versions prior to 5.73.16 and 6.7.2. The issue is caused by missing authorization checks in the revision controllers, which allows authenticated Control Panel users to view entry revisions for any collection with revisions enabled, regardless of their permissions for those collections.

This bypass of authorization exposes sensitive entry field values and blueprint data. Additionally, users without edit permissions can create entry revisions, which only snapshot the current content state and do not affect published content.

The vulnerability is due to CWE-862 (Missing Authorization) and was fixed in versions 5.73.16 and 6.7.2.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing authenticated Control Panel users to access entry revisions and sensitive data they should not have permission to see, potentially exposing confidential information.

Users without edit permissions can also create entry revisions, which may lead to unauthorized snapshots of content states, although this does not affect the published content.

Overall, the confidentiality and integrity of content data are at risk, with a CVSS base score of 5.4 indicating moderate severity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated Control Panel users to bypass authorization checks and access entry revisions for any collection with revisions enabled, exposing entry field values and blueprint data. Such unauthorized exposure of potentially sensitive data could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information.

Although the vulnerability has a low confidentiality impact, the unauthorized access to data may still violate compliance requirements related to data privacy and security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves missing authorization checks in the Statamic CMS revision controllers, allowing authenticated Control Panel users to access entry revisions without proper permissions.

To detect if your system is vulnerable, first verify the version of Statamic CMS you are running. Versions prior to 5.73.16 and 6.7.2 are affected.

You can check the installed version by running commands such as:

  • For Composer-based installations: `composer show statamic/cms | grep versions`
  • Or check the version in your Statamic Control Panel under the About or System Information section.

To detect exploitation attempts, monitor authenticated Control Panel user activity for unusual access to entry revisions of collections they do not have permissions for.

Since the vulnerability requires authenticated access, review logs for users accessing revision endpoints or creating entry revisions without edit permissions.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade Statamic CMS to version 5.73.16 or 6.7.2 or later, where this vulnerability has been fixed.

Until you can upgrade, restrict Control Panel user access to trusted users only, as the vulnerability requires authenticated access.

Additionally, monitor and audit Control Panel user activities for unauthorized access to entry revisions or creation of entry revisions without proper permissions.

Consider implementing additional access controls or network restrictions to limit access to the Control Panel.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart