Home

Description

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged (with the ability to create a page) user can cause XSS with the injection of svg element. The XSS can further be escalated to dump the entire system information available under /admin/config/info whenever a Super Admin visits the page; which can further be chained with the use of admin-nonce to do a complete server compromise (RCE). This vulnerability is fixed in 2.0.0-beta.2.

PUBLISHED Reserved 2026-04-29 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




HIGH: 8.9CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.0.0-beta.2
affected

References

github.com/...v/grav/security/advisories/GHSA-w8cg-7jcj-4vv2 exploit

github.com/...v/grav/security/advisories/GHSA-w8cg-7jcj-4vv2

github.com/...ommit/5a12f9be8314682c8713e569e330f11805d0a663

cve.org (CVE-2026-42611)

nvd.nist.gov (CVE-2026-42611)

Download JSON