CVE-2026-42607 PUBLISHED

Grav: Remote Code Execution (RCE) via Malicious Plugin ZIP Upload in Direct Install Feature

Assigner: GitHub_M
Reserved: 29.04.2026 Published: 11.05.2026 Updated: 11.05.2026

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, an authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system attempts to block direct .php file uploads, it fails to inspect the contents of uploaded ZIP archives. Once a malicious plugin is extracted, it can execute arbitrary PHP code or drop a persistent web shell on the server. This vulnerability is fixed in 2.0.0-beta.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor getgrav
Product grav
Versions
  • Version < 2.0.0-beta.2 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE