CVE-2026-42843 PUBLISHED

grav-plugin-api: Grav API Privilege Escalation to Super Admin

Assigner: GitHub_M
Reserved: 30.04.2026 Published: 11.05.2026 Updated: 11.05.2026

Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API plugin (UsersController::update) allows any authenticated user with basic API access (api.access) to modify their own permission configuration. An attacker can exploit this to escalate their privileges to Super Administrator (admin.super and api.super), leading to full system compromise and potential RCE. This vulnerability is fixed in 1.0.0-beta.15.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor getgrav
Product grav-plugin-api
Versions
  • Version < 1.0.0-beta.15 is affected

References

Problem Types

  • CWE-863: Incorrect Authorization CWE