Home

Description

The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Grav CMS Form plugin's select field template. Taxonomy tag and category values are rendered with the Twig |raw filter in the admin panel, bypassing the global autoescape protection. An editor-level user can inject arbitrary JavaScript that executes in any administrator's browser session when they view or edit any page in the admin panel. This vulnerability is fixed in 9.1.0.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.0.0-beta.2
affected

< 9.1.0
affected

References

github.com/...v/grav/security/advisories/GHSA-c2q3-p4jr-c55f exploit

github.com/...v/grav/security/advisories/GHSA-c2q3-p4jr-c55f

github.com/...ommit/6bffb4c98be468a155d1656544ec45bb4a443957

cve.org (CVE-2026-42842)

nvd.nist.gov (CVE-2026-42842)

Download JSON