A high-complexity Server-Side Request Forgery (SSRF) vulnerability, tracked as CVE-2026-28423, has been discovered in the Statamic content management system (CMS). The flaw resides in the Glide image manipulation feature and can be exploited by an unauthenticated attacker to coerce the server into sending arbitrary HTTP requests. The most severe impact of this vulnerability is the potential for an attacker to query cloud provider metadata services (such as the AWS metadata endpoint) and steal temporary instance credentials. These credentials could then be used to gain unauthorized access to other cloud services, leading to a full infrastructure compromise. Although the vulnerability has a moderate CVSS score of 6.8 due to its complexity, the potential impact is high, and users should take immediate action.
CVE-2026-28423An unauthenticated attacker can exploit this flaw by crafting a special URL that targets the Statamic image proxy or by using the watermark feature. The server-side code does not properly validate the user-supplied URL, causing the server to initiate a request to the attacker-specified address. This allows the attacker to bypass firewall rules and interact with services on the server's internal network or with cloud metadata endpoints.
There is currently no evidence of active exploitation or a publicly available proof-of-concept (PoC) for this vulnerability. However, with the public disclosure, security researchers and threat actors will likely begin developing exploits.
A successful SSRF attack can have several serious consequences:
http://169.254.169.254/latest/meta-data/iam/security-credentials/[role-name]), an attacker can steal temporary IAM credentials. These credentials can then be used with AWS CLI or APIs to access S3 buckets, databases, and other cloud resources, leading to a complete takeover of the cloud account.| Type | Value | Description |
|---|---|---|
| url_pattern | Glide image URLs containing internal or metadata IP addresses | Look for requests to the Glide image proxy that include IPs like 127.0.0.1, 10.0.0.0/8, or 169.254.169.254. |
| network_traffic_pattern | Outbound requests from web server to cloud metadata service | Any network traffic from a web server instance to 169.254.169.254 is highly suspicious and a strong indicator of an SSRF attack. |
| log_source | Web server access logs | Scrutinize logs for unusual URL patterns in requests to the image processing endpoints. |
169.254.169.254). This is a critical detection and prevention control.Inbound Traffic Filtering.169.254.169.254.Update the Statamic CMS to a patched version to fix the root vulnerability.
Mapped D3FEND Techniques:
Implement strict egress filtering to block web servers from making requests to internal network ranges and the cloud metadata service IP.
Mapped D3FEND Techniques:
Enforce the use of IMDSv2 on cloud instances to mitigate the impact of SSRF vulnerabilities.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats