Statamic CMS Privilege Escalation via Antlers Sandbox Escape and Session Bypass
Vulnerability ID: CVE-2026-27939
CVSS Score: 8.8
Published: 2026-02-27
A critical privilege escalation vulnerability exists in Statamic CMS versions prior to 6.4.0, allowing authenticated Control Panel users to bypass the 'Elevated Session' (sudo mode) mechanism. The vulnerability stems from a combination of flaws, primarily a sandbox escape in the Antlers template engine that exposes the application configuration—including the Laravel APP_KEY. Successful exploitation allows attackers to forge session cookies, execute arbitrary code, or manipulate administrative state without providing the required password verification.
TL;DR
Authenticated attackers can bypass the Statamic Control Panel's password verification prompt (sudo mode) to execute administrative actions. The flaw involves leaking the APP_KEY via the Antlers template engine, enabling session forgery and full system compromise.
⚠️ Exploit Status: POC
Technical Details
- CWE-ID: CWE-287 (Improper Authentication)
- CVSS v3.1: 8.8 (High)
- Attack Vector: Network
- Privileges Required: Low (Authenticated User)
- Impact: Full System Compromise
- Exploit Status: PoC Available
Affected Systems
- Statamic CMS v6.0.0 - v6.3.9
- Statamic CMS v5.x (Prior to Feb 2026 patches)
-
Statamic CMS: >= 6.0.0, < 6.4.0 (Fixed in:
6.4.0) -
Statamic CMS: 5.x (Fixed in:
5.x (Latest Patch))
Mitigation Strategies
- Upgrade Statamic to version 6.4.0 or later.
- Rotate the Laravel APP_KEY immediately.
- Restrict Control Panel access to trusted IP addresses where possible.
- Audit Antlers templates for usage of raw PHP or config access.
Remediation Steps:
- Run
composer update statamic/cms --with-dependenciesto fetch the latest version. - Verify the installed version is >= 6.4.0 using
php artisan statamic:version. - Run
php artisan key:generateto invalidate potentially compromised session cookies. - Clear the application cache using
php artisan cache:clearandphp artisan view:clear.
References
Read the full report for CVE-2026-27939 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)