CVE-2023-38490
PHP vulnerability analysis and mitigation

Overview

CVE-2023-38490 affects Kirby, a content management system, in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. The vulnerability only impacts Kirby sites that use the Xml data handler or the Xml::parse() method in site or plugin code. The vulnerability was discovered in July 2023 and was responsibly reported by Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 (GitHub Advisory).

Technical details

The vulnerability is an XML External Entity (XXE) issue that occurs because Kirby's Xml::parse() method used PHP's LIBXML_NOENT constant, which enabled the processing of XML external entities during parsing operations. The Xml::parse() method is used in the Xml data handler (e.g. Data::decode($string, 'xml')). The vulnerability has a CVSS v3.1 base score of 6.8 (Medium) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N (GitHub Advisory).

Impact

If exploited, this vulnerability could allow attackers to disclose internal or confidential data stored on the server through arbitrary file disclosure or perform network requests on behalf of the server through server-side request forgery (SSRF). This is particularly concerning when XML files are of external origin, such as those uploaded by users or retrieved from external URLs (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. The fix removes the LIBXML_NOENT constant as processing of external entities is considered out of scope of the parsing logic. Users are strongly recommended to update to one of these patched versions or later to protect against this vulnerability (GitHub Advisory, GitHub Release).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management