Kirby CMS has Persistent DoS via Malformed Image Upload
Moderate severity
GitHub Reviewed
Published
Mar 26, 2026
in
Stalin-143/CVE-2026-29905
•
Updated Mar 27, 2026
Description
Published by the National Vulnerability Database
Mar 26, 2026
Published to the GitHub Advisory Database
Mar 27, 2026
Reviewed
Mar 27, 2026
Last updated
Mar 27, 2026
Summary
Kirby CMS through version 5.1.4 allows an authenticated user with Editor permissions to cause a persistent Denial of Service (DoS) via a malformed image upload.
Details
The vulnerability is caused by improper validation of the return value of PHP's
getimagesize()function. When a malformed file is uploaded with a valid image extension (e.g.,.jpg), the function returnsfalseinstead of an expected array.The application fails to handle this condition properly and proceeds with image processing, resulting in a fatal
TypeError. This leads to persistent application crashes when the affected file is accessed.Impact
References