Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r945-h4vm-h736 | Grav API Privilege Escalation to Super Admin |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav-plugin-api |
|
| Vendors & Products |
Getgrav
Getgrav grav-plugin-api |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API plugin (UsersController::update) allows any authenticated user with basic API access (api.access) to modify their own permission configuration. An attacker can exploit this to escalate their privileges to Super Administrator (admin.super and api.super), leading to full system compromise and potential RCE. This vulnerability is fixed in 1.0.0-beta.15. | |
| Title | grav-plugin-api: Grav API Privilege Escalation to Super Admin | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T19:06:51.035Z
Reserved: 2026-04-30T16:44:48.376Z
Link: CVE-2026-42843
Updated: 2026-05-11T18:51:16.359Z
Status : Awaiting Analysis
Published: 2026-05-11T17:16:34.013
Modified: 2026-05-13T16:04:12.830
Link: CVE-2026-42843
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:03Z
Github GHSA