Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 CWE-252 |
|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-26T18:31:41.421Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29905
Updated: 2026-03-26T18:28:53.512Z
Status : Received
Published: 2026-03-26T17:16:34.660
Modified: 2026-03-26T19:16:59.027
Link: CVE-2026-29905
No data.
OpenCVE Enrichment
No data.