SB2020120235 - Multiple vulnerabilities in Kirby



SB2020120235 - Multiple vulnerabilities in Kirby

Published: December 2, 2020 Updated: April 23, 2026

Security Bulletin ID SB2020120235
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Arbitrary file upload (CVE-ID: CVE-2020-26255)

The vulnerability allows a remote user to execute arbitrary code on the server.

The vulnerability exists due to unrestricted upload of file with dangerous type in content file upload handling when uploading a PHP Phar archive as a content file through the Panel. A remote user can upload a crafted .phar file to execute arbitrary code on the server.

Only authenticated Panel users with full access to the Kirby Panel can exploit this issue, and visitors without Panel access cannot use this attack vector.


2) External Initialization of Trusted Variables or Data Stores (CVE-ID: CVE-2020-26253)

The vulnerability allows a remote attacker to register the first panel account and gain administrative access.

The vulnerability exists due to external initialization of trusted variables or data stores in the panel installation block when determining whether the site is local on .dev domains or behind some reverse proxy setups. A remote attacker can access the panel registration flow before the legitimate administrator to register the first panel account and gain administrative access.

Exploitation is only possible if no panel account has been created yet.


Remediation

Install update from vendor's website.