Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42845— Grav: Anonymous Page Content Overwrite via Form File Upload filename Override

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42845

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grav: Anonymous Page Content Overwrite via Form File Upload filename Override
Source: NVD (National Vulnerability Database)
Vulnerability Description
The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0 , there is an unauthenticated page-content overwrite via file upload (GHSA-w4rc-p66m-x6qq). Public form uploads now strip path components from the POST-supplied filename and hard-block page-content extensions (`md`, `yaml`, `yml`, `json`, `twig`, `ini`) regardless of the configurable dangerous-extensions list. A permissive `accept` policy combined with the default `destination: self@` could otherwise let an attacker overwrite the page's own `.md` and pivot to super-admin via a `process: save` action. This vulnerability is fixed in 9.1.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
文件名或路径的外部可控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grav CMS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grav CMS是Grav开源的一个基于文件的扁平化内容管理系统。 Grav CMS 9.1.0之前版本存在安全漏洞,该漏洞源于文件上传时未剥离路径组件且未硬性阻止页面内容扩展名,可能导致未认证用户覆盖页面内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
getgravgrav-plugin-form < 9.1.0 -

II. Public POCs for CVE-2026-42845

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42845

登录查看更多情报信息。

Same Patch Batch · getgrav · 2026-05-11 · 13 CVEs total

CVE-2026-426139.4 CRITICALGrav: Privilege Escalation via Missing Server-Side Validation of groups/access
CVE-2026-426079.1 CRITICALGrav: Remote Code Execution (RCE) via Malicious Plugin ZIP Upload in Direct Install Featur
CVE-2026-426118.9 HIGHGrav: Stored XSS via Tag Injection
CVE-2026-428438.8 HIGHgrav-plugin-api: Grav API Privilege Escalation to Super Admin
CVE-2026-426128.5 HIGHGrav: Publisher-Level Stored XSS via Unquoted Event Attributes
CVE-2026-426098.1 HIGHGrav: Administrative Account Disruption and Privilege De-escalation via User Overwrite Log
CVE-2026-447387.7 HIGHGrav: Twig sandbox allows editor-role users to exfiltrate all plugin secrets via Config::t
CVE-2026-426106.5 MEDIUMGrav: Sensitive Information Disclosure via Accounts Service Bypass
CVE-2026-428425.4 MEDIUMgrav-plugin-form: XSS via Taxonomy Field Values in Admin Panel
CVE-2026-42608Grav: Unauthenticated Path Traversal & Arbitrary File Write in FormFlash component.
CVE-2026-42841Grav: Stored XSS via Markdown media attribute() action in Grav CMS
CVE-2026-44737grav-plugin-admin: Stored Cross-Site Scripting (XSS) Reflected endpoint /admin/pages/[page

IV. Related Vulnerabilities

V. Comments for CVE-2026-42845

No comments yet


Leave a comment