๐Ÿ” CVE Alert

CVE-2026-42845

UNKNOWN 0.0

Grav: Anonymous Page Content Overwrite via Form File Upload filename Override

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
13th

The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0 , there is an unauthenticated page-content overwrite via file upload (GHSA-w4rc-p66m-x6qq). Public form uploads now strip path components from the POST-supplied filename and hard-block page-content extensions (`md`, `yaml`, `yml`, `json`, `twig`, `ini`) regardless of the configurable dangerous-extensions list. A permissive `accept` policy combined with the default `destination: self@` could otherwise let an attacker overwrite the page's own `.md` and pivot to super-admin via a `process: save` action. This vulnerability is fixed in 9.1.0.

CWE CWE-73
Vendor getgrav
Product grav-plugin-form
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for getgrav grav-plugin-form

Be the first to know when new unknown vulnerabilities affecting getgrav grav-plugin-form are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

getgrav / grav-plugin-form
< 9.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/getgrav/grav/security/advisories/GHSA-w4rc-p66m-x6qq github.com: https://github.com/getgrav/grav-plugin-form/commit/48bacc4187e1cff815000e526d5ca2878484867f