{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25759","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-05T18:35:52.357Z","datePublished":"2026-02-11T20:37:37.741Z","dateUpdated":"2026-02-12T21:18:56.237Z"},"containers":{"cna":{"title":"Statmatic affected by privilege escalation via stored cross-site scripting","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8"},{"name":"https://github.com/statamic/cms/commit/6ed4f65f3387686d6dbd816e9b4f18a8d9736ff6","tags":["x_refsource_MISC"],"url":"https://github.com/statamic/cms/commit/6ed4f65f3387686d6dbd816e9b4f18a8d9736ff6"},{"name":"https://github.com/statamic/cms/releases/tag/v6.2.3","tags":["x_refsource_MISC"],"url":"https://github.com/statamic/cms/releases/tag/v6.2.3"}],"affected":[{"vendor":"statamic","product":"cms","versions":[{"version":">= 6.0.0, < 6.2.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-11T20:37:37.741Z"},"descriptions":[{"lang":"en","value":"Statmatic is a Laravel and Git powered content management system (CMS). From 6.0.0 to before 6.2.3, a stored XSS vulnerability in content titles allows authenticated users with content creation permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. Malicious user must have an account with control panel access and content creation permissions. This vulnerability can be exploited to allow super admin accounts to be created. This has been fixed in 6.2.3."}],"source":{"advisory":"GHSA-ff9r-ww9c-43x8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-12T21:18:49.299315Z","id":"CVE-2026-25759","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-12T21:18:56.237Z"}}]}}