The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Grav CMS Form plugin's select field template. Taxonomy tag and category values are rendered with the Twig |raw filter in the admin panel, bypassing the global autoescape protection. An editor-level user can inject arbitrary JavaScript that executes in any administrator's browser session when they view or edit any page in the admin panel. This vulnerability is fixed in 9.1.0.

Project Subscriptions

Vendors Products
Getgrav Subscribe
Grav-plugin-form Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c2q3-p4jr-c55f Grav Vulnerable to XSS via Taxonomy Field Values in Admin Panel
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Getgrav
Getgrav grav
Getgrav grav-plugin-form
Vendors & Products Getgrav
Getgrav grav
Getgrav grav-plugin-form

Mon, 11 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 16:30:00 +0000

Type Values Removed Values Added
Description The form plugin for Grav adds the ability to create and use forms. Prior to 9.1.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Grav CMS Form plugin's select field template. Taxonomy tag and category values are rendered with the Twig |raw filter in the admin panel, bypassing the global autoescape protection. An editor-level user can inject arbitrary JavaScript that executes in any administrator's browser session when they view or edit any page in the admin panel. This vulnerability is fixed in 9.1.0.
Title grav-plugin-form: XSS via Taxonomy Field Values in Admin Panel
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-11T18:25:09.488Z

Reserved: 2026-04-30T16:44:48.376Z

Link: CVE-2026-42842

cve-icon Vulnrichment

Updated: 2026-05-11T18:25:05.790Z

cve-icon NVD

Status : Received

Published: 2026-05-11T17:16:33.873

Modified: 2026-05-11T19:16:24.190

Link: CVE-2026-42842

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:23:06Z

Weaknesses