XML injection in Kirby - CVE-2026-32870

 

XML injection in Kirby - CVE-2026-32870

Published: April 23, 2026


Vulnerability identifier: #VU127199
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2026-32870
CWE-ID: CWE-91
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Ian Stewart
Affected software:
Kirby

Detailed vulnerability description

The vulnerability allows a remote attacker to manipulate the behavior of another system that processes generated XML data.

The vulnerability exists due to xml injection in the Xml::value() method when processing attacker-controlled input for XML generation. A remote attacker can supply crafted input containing a valid CDATA block and additional structured data to manipulate the behavior of another system that processes generated XML data.

Only sites that use the Xml data handler or the Xml::create(), Xml::tag(), or Xml::value() methods in site or plugin code are affected.


How to mitigate CVE-2026-32870

Install security update from vendor's website.

Sources