Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c2q3-p4jr-c55f | Grav Vulnerable to XSS via Taxonomy Field Values in Admin Panel |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav Getgrav grav-plugin-form |
|
| Vendors & Products |
Getgrav
Getgrav grav Getgrav grav-plugin-form |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Grav CMS Form plugin's select field template. Taxonomy tag and category values are rendered with the Twig |raw filter in the admin panel, bypassing the global autoescape protection. An editor-level user can inject arbitrary JavaScript that executes in any administrator's browser session when they view or edit any page in the admin panel. This vulnerability is fixed in 9.1.0. | |
| Title | grav-plugin-form: XSS via Taxonomy Field Values in Admin Panel | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:25:09.488Z
Reserved: 2026-04-30T16:44:48.376Z
Link: CVE-2026-42842
Updated: 2026-05-11T18:25:05.790Z
Status : Deferred
Published: 2026-05-11T17:16:33.873
Modified: 2026-05-13T16:04:38.397
Link: CVE-2026-42842
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:06Z
Github GHSA