| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r945-h4vm-h736 | Grav API Privilege Escalation to Super Admin |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav-plugin-api |
|
| Vendors & Products |
Getgrav
Getgrav grav-plugin-api |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API plugin (UsersController::update) allows any authenticated user with basic API access (api.access) to modify their own permission configuration. An attacker can exploit this to escalate their privileges to Super Administrator (admin.super and api.super), leading to full system compromise and potential RCE. This vulnerability is fixed in 1.0.0-beta.15. | |
| Title | grav-plugin-api: Grav API Privilege Escalation to Super Admin | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T19:06:51.035Z
Reserved: 2026-04-30T16:44:48.376Z
Link: CVE-2026-42843
Updated: 2026-05-11T18:51:16.359Z
Status : Received
Published: 2026-05-11T17:16:34.013
Modified: 2026-05-11T20:25:42.893
Link: CVE-2026-42843
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:03Z
Github GHSA