Vulnerability Description
Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getkirby | Kirby | <= 5.1.4 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/1MwvvSYIwnC8kOIzjycGMQZw4d2K2ef8h/view?usp=shariExploit
- https://github.com/Stalin-143/CVE-2026-29905Third Party Advisory
- https://github.com/getkirby/kirby/releases/tag/5.2.0-rc.1Product
FAQ
What is CVE-2026-29905?
CVE-2026-29905 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate th...
How severe is CVE-2026-29905?
CVE-2026-29905 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29905?
Check the references section above for vendor advisories and patch information. Affected products include: Getkirby Kirby.