A high-complexity Server-Side Request Forgery (SSRF) vulnerability, tracked as CVE-2026-28423, has been discovered in the Statamic content management system (CMS). The flaw resides in the Glide image manipulation feature and can be exploited by an unauthenticated attacker to coerce the server into sending arbitrary HTTP requests. The most severe impact of this vulnerability is the potential for an attacker to query cloud provider metadata services (such as the AWS metadata endpoint) and steal temporary instance credentials. These credentials could then be used to gain unauthorized access to other cloud services, leading to a full infrastructure compromise. Although the vulnerability has a moderate CVSS score of 6.8 due to its complexity, the potential impact is high, and users should take immediate action.
CVE-2026-28423An unauthenticated attacker can exploit this flaw by crafting a special URL that targets the Statamic image proxy or by using the watermark feature. The server-side code does not properly validate the user-supplied URL, causing the server to initiate a request to the attacker-specified address. This allows the attacker to bypass firewall rules and interact with services on the server's internal network or with cloud metadata endpoints.
There is currently no evidence of active exploitation or a publicly available proof-of-concept (PoC) for this vulnerability. However, with the public disclosure, security researchers and threat actors will likely begin developing exploits.
A successful SSRF attack can have several serious consequences:
http://169.254.169.254/latest/meta-data/iam/security-credentials/[role-name]), an attacker can steal temporary IAM credentials. These credentials can then be used with AWS CLI or APIs to access S3 buckets, databases, and other cloud resources, leading to a complete takeover of the cloud account.127.0.0.1, 10.0.0.0/8, or 169.254.169.254.169.254.169.254 is highly suspicious and a strong indicator of an SSRF attack.169.254.169.254). This is a critical detection and prevention control.Inbound Traffic Filtering.169.254.169.254.Update the Statamic CMS to a patched version to fix the root vulnerability.
Mapped D3FEND Techniques:
Implement strict egress filtering to block web servers from making requests to internal network ranges and the cloud metadata service IP.
Mapped D3FEND Techniques:
Enforce the use of IMDSv2 on cloud instances to mitigate the impact of SSRF vulnerabilities.
Mapped D3FEND Techniques:
Security advisories for CVE-2026-28423 are updated with further details.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.