Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-42613 | 9.4 CRITICAL | Grav: Privilege Escalation via Missing Server-Side Validation of groups/access |
| CVE-2026-42607 | 9.1 CRITICAL | Grav: Remote Code Execution (RCE) via Malicious Plugin ZIP Upload in Direct Install Featur |
| CVE-2026-42843 | 8.8 HIGH | grav-plugin-api: Grav API Privilege Escalation to Super Admin |
| CVE-2026-42612 | 8.5 HIGH | Grav: Publisher-Level Stored XSS via Unquoted Event Attributes |
| CVE-2026-42609 | 8.1 HIGH | Grav: Administrative Account Disruption and Privilege De-escalation via User Overwrite Log |
| CVE-2026-44738 | 7.7 HIGH | Grav: Twig sandbox allows editor-role users to exfiltrate all plugin secrets via Config::t |
| CVE-2026-42610 | 6.5 MEDIUM | Grav: Sensitive Information Disclosure via Accounts Service Bypass |
| CVE-2026-42842 | 5.4 MEDIUM | grav-plugin-form: XSS via Taxonomy Field Values in Admin Panel |
| CVE-2026-42608 | Grav: Unauthenticated Path Traversal & Arbitrary File Write in FormFlash component. | |
| CVE-2026-42845 | Grav: Anonymous Page Content Overwrite via Form File Upload filename Override | |
| CVE-2026-42841 | Grav: Stored XSS via Markdown media attribute() action in Grav CMS | |
| CVE-2026-44737 | grav-plugin-admin: Stored Cross-Site Scripting (XSS) Reflected endpoint /admin/pages/[page |
No comments yet