| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m24v-f7g5-gq67 | Statamic CMS vulnerable to email enumeration via forgot password endpoint |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Statamic
Statamic cms |
|
| Vendors & Products |
Statamic
Statamic cms |
Tue, 12 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Statamic is a Laravel and Git powered content management system (CMS). Prior to 5.73.21 and 6.15.0, responses from the forgot password forms hinted at whether an account existed for a given email address. An unauthenticated attacker could use this to enumerate valid users, which can aid in follow-up credential-based attacks. This vulnerability is fixed in 5.73.21 and 6.15.0. | |
| Title | Statamic: Email enumeration via forgot password endpoint | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T18:20:39.730Z
Reserved: 2026-05-05T19:00:06.021Z
Link: CVE-2026-44306
Updated: 2026-05-13T18:15:59.020Z
Status : Deferred
Published: 2026-05-12T22:16:37.413
Modified: 2026-05-13T15:43:05.440
Link: CVE-2026-44306
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:15:27Z
Github GHSA