Home

Description

The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0 , there is an unauthenticated page-content overwrite via file upload (GHSA-w4rc-p66m-x6qq). Public form uploads now strip path components from the POST-supplied filename and hard-block page-content extensions (`md`, `yaml`, `yml`, `json`, `twig`, `ini`) regardless of the configurable dangerous-extensions list. A permissive `accept` policy combined with the default `destination: self@` could otherwise let an attacker overwrite the page's own `.md` and pivot to super-admin via a `process: save` action. This vulnerability is fixed in 9.1.0.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-73: External Control of File Name or Path

Product status

< 9.1.0
affected

References

github.com/...v/grav/security/advisories/GHSA-w4rc-p66m-x6qq

github.com/...ommit/48bacc4187e1cff815000e526d5ca2878484867f

cve.org (CVE-2026-42845)

nvd.nist.gov (CVE-2026-42845)

Download JSON