Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w4rc-p66m-x6qq | Grav Form Plugin has an Anonymous Page Content Overwrite via Form File Upload filename Override |
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav-plugin-form |
|
| Vendors & Products |
Getgrav
Getgrav grav-plugin-form |
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0 , there is an unauthenticated page-content overwrite via file upload (GHSA-w4rc-p66m-x6qq). Public form uploads now strip path components from the POST-supplied filename and hard-block page-content extensions (`md`, `yaml`, `yml`, `json`, `twig`, `ini`) regardless of the configurable dangerous-extensions list. A permissive `accept` policy combined with the default `destination: self@` could otherwise let an attacker overwrite the page's own `.md` and pivot to super-admin via a `process: save` action. This vulnerability is fixed in 9.1.0. | |
| Title | Grav: Anonymous Page Content Overwrite via Form File Upload filename Override | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T13:49:49.704Z
Reserved: 2026-04-30T16:44:48.377Z
Link: CVE-2026-42845
Updated: 2026-05-12T13:49:33.409Z
Status : Deferred
Published: 2026-05-11T17:16:34.157
Modified: 2026-05-12T14:51:21.830
Link: CVE-2026-42845
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:05Z
Github GHSA