First published: Tue Nov 14 2023(Updated: )
### Impact Similar to [another advisory](https://github.com/statamic/cms/security/advisories/GHSA-72hg-5wr5-rmfc), certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. ### Patches It has been patched in 3.4.14 and 4.34.0.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/statamic/cms | <3.4.14 | 3.4.14 |
composer/statamic/cms | >=4.0.0<4.34.0 | 4.34.0 |
Statamic Statamic | <3.4.14 | |
Statamic Statamic | >=4.0.0<4.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this remote code execution vulnerability is CVE-2023-48217.
The severity of CVE-2023-48217 is high (severity value of 8.8).
The Statamic CMS versions 3.4.14 and below, and versions 4.0.0 to 4.34.0 are affected by CVE-2023-48217.
To fix the CVE-2023-48217 vulnerability, upgrade your Statamic CMS installation to version 3.4.14 or above for versions 3.x, and version 4.34.0 or above for versions 4.x.
The Common Weakness Enumeration (CWE) ID for CVE-2023-48217 is CWE-94.