<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 21:24:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kirby CMS Server-Side Template Injection via Double Template Resolution</title><link>https://feed.craftedsignal.io/briefs/2026-04-kirby-ssti/</link><pubDate>Thu, 23 Apr 2026 21:24:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kirby-ssti/</guid><description>A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.</description><content:encoded><![CDATA[<p>A server-side template injection (SSTI) vulnerability has been identified in Kirby CMS affecting sites using option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) with options sourced from queries or APIs where the values cannot be fully trusted. This vulnerability, discovered and reported by @offset, stems from a double resolution of templates within the options rendering logic. An attacker with Panel access or through user interaction can inject malicious query templates. This can lead to unauthorized access to sensitive information (like user passwords) or malicious modification of site content. The vulnerability affects Kirby CMS versions prior to 4.9.0 and versions between 5.0.0 and 5.4.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Kirby Panel, or convinces a user with access to interact with a malicious element.</li>
<li>The attacker identifies a page or blueprint using dynamic options for form fields (checkboxes, selects, etc.) sourced from a query or API.</li>
<li>The attacker injects a malicious query template, such as <code>{{ users.first.password }}</code> or <code>{{ page.delete }}</code>, into a page title or data returned from an external API.</li>
<li>The administrator or another privileged user navigates to the affected Panel view, triggering the rendering of the form field with the injected malicious template.</li>
<li>The Kirby CMS options logic improperly double-resolves the template, executing the injected query.</li>
<li>The attacker gains access to sensitive information, such as user passwords, or triggers unauthorized actions like page deletion, depending on the injected query.</li>
<li>The attacker escalates privileges by exploiting the compromised user&rsquo;s session or by directly accessing sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow attackers to access sensitive site information, such as user credentials, or perform unauthorized actions, like modifying or deleting content. This could lead to a complete compromise of the Kirby CMS website and its data. The vulnerability specifically targets sites that leverage dynamic options for form fields, making them susceptible to malicious query injection. Sites running vulnerable versions of Kirby CMS are at risk of information disclosure and unauthorized modification.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kirby CMS version 4.9.0 or 5.4.0 or later to patch the vulnerability as described in the advisory (<a href="https://github.com/advisories/GHSA-jcjw-58rv-c452">https://github.com/advisories/GHSA-jcjw-58rv-c452</a>).</li>
<li>Apply input validation and sanitization to all data sources used for dynamic options to prevent the injection of malicious templates and mitigate CVE-2026-34587.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing template syntax or attempts to access sensitive information, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssti</category><category>kirby</category><category>template-injection</category></item></channel></rss>