CVE-2026-42610
EUVD-2026-2906811.05.2026, 16:17
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged user (EX: Content Editor with only pages.update permissions) can bypass the existing Twig sandbox restrictions by utilizing the grav['accounts'] service. Attacker can programmatically load administrative user objects and extract sensitive data, including Bcrypt password hashes and the security salt. This vulnerability is fixed in 2.0.0-beta.2.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| getgrav | grav | 𝑥 ≤ 1.8.0 |
| getgrav | grav | 2.0.0:beta1 |
𝑥
= Vulnerable software versions