Grav XSS Escalates to RCE via Admin Panel
A critical cross-site scripting (XSS) vulnerability, tracked as CVE-2026-42611, has been identified in Grav, a popular file-based web platform. As reported by the National Vulnerability Database, this flaw allows a low-privileged user, specifically one with page creation capabilities, to inject SVG elements and trigger an XSS.
This XSS is not just a nuisance; it’s a stepping stone. The National Vulnerability Database further details that the XSS can be escalated to dump sensitive system information from the /admin/config/info page whenever a Super Admin visits it. Critically, this can then be chained with the admin-nonce mechanism to achieve a complete server compromise, resulting in Remote Code Execution (RCE). This is a serious attack path.
The vulnerability, which carries a CVSS score of 8.9 (HIGH), is fixed in Grav version 2.0.0-beta.2. Any organization running Grav versions prior to this beta release is exposed to a significant risk of server takeover if an attacker gains even minimal authenticated access.
What This Means For You
- If your organization uses Grav, you need to immediately check your version. Any installation prior to 2.0.0-beta.2 is vulnerable. Patching is non-negotiable. Audit your Grav instances for unauthorized page creations or suspicious activity, especially if you have users with low-privileged access. This isn't theoretical; it's a direct path to RCE.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42611 | XSS | Grav web platform versions prior to 2.0.0-beta.2 |
| CVE-2026-42611 | XSS | Injection of SVG element by low-privileged user |
| CVE-2026-42611 | Information Disclosure | Escalation to dump system information from /admin/config/info |
| CVE-2026-42611 | RCE | Chaining with admin-nonce for server compromise |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 19:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.