CVE-2026-42608 PUBLISHED

Grav: Unauthenticated Path Traversal & Arbitrary File Write in FormFlash component.

Assigner: GitHub_M
Reserved: 29.04.2026 Published: 11.05.2026 Updated: 11.05.2026

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, there is a Path Traversal vulnerability within the FormFlash core component. By manipulating the session_id (passed as __form-flash-id in POST requests), an unauthenticated attacker can traverse the filesystem to create arbitrary directories and write an index.yaml file containing attacker-controlled data. This vulnerability can lead to unauthorized modification of application behavior, potential data integrity issues, and service disruption in production environments. This vulnerability is fixed in 2.0.0-beta.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 8.8

Product Status

Vendor getgrav
Product grav
Versions
  • Version < 2.0.0-beta.2 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE