CVE-2026-42613

Grav · Grav CMS

Grav CMS is vulnerable to an authentication bypass during user registration, allowing an unauthenticated user to assign themselves administrative privileges.

Executive summary

An unauthenticated attacker can gain full administrative control of a Grav CMS instance by exploiting a flaw in the user registration process.

Vulnerability

This is an authentication and privilege escalation vulnerability in the Login::register() method. The method fails to validate input for group and access fields, allowing any unauthenticated user to register with admin.super privileges.

Business impact

This vulnerability allows an attacker to take over the entire content management system, leading to total loss of control over the website's content, users, and configuration. The 9.4 CVSS score reflects the high risk of complete platform takeover.

Remediation

Immediate Action: Upgrade to Grav version 2.0.0-beta.2 or later.

Proactive Monitoring: Review the user list for unauthorized accounts with administrative roles and audit registration logs for anomalous activity.

Compensating Controls: If upgrading is not immediately possible, disable user registration functionality.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate patching is essential. Organizations should update their Grav installation and conduct a thorough audit of their user base to ensure no unauthorized administrative accounts have been created.