{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-28426","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-27T15:54:05.137Z","datePublished":"2026-02-27T22:23:42.660Z","dateUpdated":"2026-03-02T19:39:23.113Z"},"containers":{"cna":{"title":"Statamic vulnerable to privilege escalation via stored cross-site scripting","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/statamic/cms/security/advisories/GHSA-5vrj-wf7v-5wr7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/statamic/cms/security/advisories/GHSA-5vrj-wf7v-5wr7"},{"name":"https://github.com/statamic/cms/releases/tag/v5.73.11","tags":["x_refsource_MISC"],"url":"https://github.com/statamic/cms/releases/tag/v5.73.11"},{"name":"https://github.com/statamic/cms/releases/tag/v6.4.0","tags":["x_refsource_MISC"],"url":"https://github.com/statamic/cms/releases/tag/v6.4.0"}],"affected":[{"vendor":"statamic","product":"cms","versions":[{"version":"< 5.73.11","status":"affected"},{"version":">= 6.0.0, < 6.4.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-27T22:23:42.660Z"},"descriptions":[{"lang":"en","value":"Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.11 and 6.4.0, stored XSS vulnerability in svg and icon related components allow authenticated users with appropriate permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. This has been fixed in 5.73.11 and 6.4.0."}],"source":{"advisory":"GHSA-5vrj-wf7v-5wr7","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T19:38:52.314921Z","id":"CVE-2026-28426","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T19:39:23.113Z"}}]}}