CVE-2022-24784

Discoverability of user password hash in Statamic CMS

Description

Statamic is a Laravel and Git powered CMS. Before versions 3.2.39 and 3.3.2, it is possible to confirm a single character of a user's password hash using a specially crafted regular expression filter in the users endpoint of the REST API. Multiple such requests can eventually uncover the entire hash. The hash is not present in the response, however the presence or absence of a result confirms if the character is in the right position. The API has throttling enabled by default, making this a time intensive task. Both the REST API and the users endpoint need to be enabled, as they are disabled by default. The issue has been fixed in versions 3.2.39 and above, and 3.3.2 and above.

Categories

3.7
CVSS
Severity: Low
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.25%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory github.com
Affected: statamic cms
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-24784?
CVE-2022-24784 has been scored as a low severity vulnerability.
How to fix CVE-2022-24784?
To fix CVE-2022-24784, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-24784 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-24784 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-24784?
CVE-2022-24784 affects statamic cms.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.