CVE-2026-42844 PUBLISHED

Grav: Low-privileged API users can create super-admin accounts via blueprint-upload

Assigner: GitHub_M
Reserved: 30.04.2026 Published: 12.05.2026 Updated: 12.05.2026

Grav is a file-based Web platform. In Grav 2.0.0-beta.2, a low-privileged authenticated API user with api.media.write can abuse /api/v1/blueprint-upload to write an arbitrary YAML file into user/accounts/, then log in as the newly created account with api.super privileges. This results in full administrative compromise of the Grav API. This vulnerability is fixed in API 1.0.0-beta.17.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor getgrav
Product grav
Versions
  • Version 2.0.0-beta.2 is affected

References

Problem Types

  • CWE-434: Unrestricted Upload of File with Dangerous Type CWE
  • CWE-269: Improper Privilege Management CWE