Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:getgrav:grav_cms:1.10.7:*:*:*:*:*:*:* |
Mon, 02 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 30 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav grav
|
|
| CPEs | cpe:2.3:a:getgrav:grav:1.10.7:*:*:*:*:*:*:* | |
| Vendors & Products |
Getgrav grav
|
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav Cms |
|
| Vendors & Products |
Getgrav
Getgrav grav Cms |
Thu, 15 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GravCMS 1.10.7 contains an unauthenticated vulnerability that allows remote attackers to write arbitrary YAML configuration and execute PHP code through the scheduler endpoint. Attackers can exploit the admin-nonce parameter to inject base64-encoded payloads and create malicious custom jobs with system command execution. | |
| Title | GravCMS 1.10.7 - Arbitrary YAML Write/Update (Unauthenticated) (2) | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:15.957Z
Reserved: 2026-01-14T17:11:19.894Z
Link: CVE-2021-47812
Updated: 2026-01-16T15:50:11.362Z
Status : Modified
Published: 2026-01-16T00:16:26.460
Modified: 2026-02-02T16:16:15.070
Link: CVE-2021-47812
No data.
OpenCVE Enrichment
Updated: 2026-01-16T13:42:32Z