CVE-2026-42845
Grav: Anonymous Page Content Overwrite via Form File Upload filename Override
The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0 , there is an unauthenticated page-content overwrite via file upload (GHSA-w4rc-p66m-x6qq). Public form uploads now strip path components from the POST-supplied filename and hard-block page-content extensions (`md`, `yaml`, `yml`, `json`, `twig`, `ini`) regardless of the configurable dangerous-extensions list. A permissive `accept` policy combined with the default `destination: self@` could otherwise let an attacker overwrite the page's own `.md` and pivot to super-admin via a `process: save` action. This vulnerability is fixed in 9.1.0.
| CWE | CWE-73 |
| Vendor | getgrav |
| Product | grav-plugin-form |
| Published | May 11, 2026 |
| Last Updated | May 12, 2026 |
Get instant alerts for getgrav grav-plugin-form
Be the first to know when new unknown vulnerabilities affecting getgrav grav-plugin-form are published โ delivered to Slack, Telegram or Discord.