CVE-2026-42607
Grav · Grav CMS
Grav CMS allows authenticated administrators to achieve Remote Code Execution (RCE) by uploading malicious ZIP files via the "Direct Install" tool.
Executive summary
A critical RCE vulnerability in Grav CMS allows an authenticated administrator to execute arbitrary code by bypassing file inspection during plugin installation.
Vulnerability
This is an RCE vulnerability involving the "Direct Install" tool. The tool fails to inspect the contents of uploaded ZIP files, allowing an attacker with administrative privileges to upload and execute a malicious plugin containing a web shell.
Business impact
Successful exploitation results in full server-side code execution, granting the attacker control over the underlying web server. With a CVSS score of 9.1, this vulnerability is a high-impact risk for any organization using the affected CMS.
Remediation
Immediate Action: Upgrade to Grav version 2.0.0-beta.2 or later.
Proactive Monitoring: Monitor the plugins directory for unauthorized files and review server logs for suspicious PHP execution.
Compensating Controls: Restrict administrative access to the "Direct Install" feature and enforce file system permissions to prevent the execution of files in the upload directory.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should prioritize upgrading to the latest version of Grav. Additionally, ensure that administrative accounts are secured with multi-factor authentication to prevent the initial access required to exploit this flaw.