Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-42609
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-11 May, 2026 | 15:03
Updated At-14 May, 2026 | 17:56
Rejected At-
▼CVE Numbering Authority (CNA)
Grav: Administrative Account Disruption and Privilege De-escalation via User Overwrite Logic

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator. By creating a new user with a username that already exists, the system updates the existing account's metadata and permissions instead of rejecting the request. This leads to a Denial of Service (DoS) on administrative functions and Privilege De-escalation of the root account. This vulnerability is fixed in 2.0.0-beta.2.

Affected Products
Vendor
getgrav
Product
grav
Versions
Affected
  • < 2.0.0-beta.2
Problem Types
TypeCWE IDDescription
CWECWE-269CWE-269: Improper Privilege Management
CWECWE-285CWE-285: Improper Authorization
CWECWE-639CWE-639: Authorization Bypass Through User-Controlled Key
CWECWE-837CWE-837: Improper Enforcement of a Single, Unique Action
Type: CWE
CWE ID: CWE-269
Description: CWE-269: Improper Privilege Management
Type: CWE
CWE ID: CWE-285
Description: CWE-285: Improper Authorization
Type: CWE
CWE ID: CWE-639
Description: CWE-639: Authorization Bypass Through User-Controlled Key
Type: CWE
CWE ID: CWE-837
Description: CWE-837: Improper Enforcement of a Single, Unique Action
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/getgrav/grav/security/advisories/GHSA-rr73-568v-28f8
x_refsource_CONFIRM
https://github.com/getgrav/grav/commit/5a12f9be8314682c8713e569e330f11805d0a663
x_refsource_MISC
https://github.com/getgrav/grav/commit/c66dfeb5ff679a1667678c6335eb9ff3255dfc47
x_refsource_MISC
https://github.com/getgrav/grav/commit/d904efc33e03ebb597afde8d3368b28cf0423632
x_refsource_MISC
Hyperlink: https://github.com/getgrav/grav/security/advisories/GHSA-rr73-568v-28f8
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/getgrav/grav/commit/5a12f9be8314682c8713e569e330f11805d0a663
Resource:
x_refsource_MISC
Hyperlink: https://github.com/getgrav/grav/commit/c66dfeb5ff679a1667678c6335eb9ff3255dfc47
Resource:
x_refsource_MISC
Hyperlink: https://github.com/getgrav/grav/commit/d904efc33e03ebb597afde8d3368b28cf0423632
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/getgrav/grav/security/advisories/GHSA-rr73-568v-28f8
exploit
Hyperlink: https://github.com/getgrav/grav/security/advisories/GHSA-rr73-568v-28f8
Resource:
exploit
Details not found