CVE-2026-42609: Grav Vulnerable to Administrative Account Disruption and Privilege De-escalation via User Overwrite Logic
A business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator. By creating a new user with a username that already exists, the system updates the existing account’s metadata and permissions instead of rejecting the request. This leads to a Denial of Service (DoS) on administrative functions and Privilege De-escalation of the root account.
References
- github.com/advisories/GHSA-rr73-568v-28f8
- github.com/getgrav/grav
- github.com/getgrav/grav/commit/5a12f9be8314682c8713e569e330f11805d0a663
- github.com/getgrav/grav/commit/c66dfeb5ff679a1667678c6335eb9ff3255dfc47
- github.com/getgrav/grav/commit/d904efc33e03ebb597afde8d3368b28cf0423632
- github.com/getgrav/grav/security/advisories/GHSA-rr73-568v-28f8
- nvd.nist.gov/vuln/detail/CVE-2026-42609
Code Behaviors & Features
Detect and mitigate CVE-2026-42609 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →