JavaScript Injection Vulnerability in Grav Web Platform by GetGrav
CVE-2026-42841

6.9MEDIUM

Key Information:

Vendor

Getgrav

Status
Vendor
CVE Published:
11 May 2026

What is CVE-2026-42841?

Grav, a popular file-based web platform, has a vulnerability that allows an authenticated user with page editing permissions to inject arbitrary JavaScript events into rendered images. This is achievable through Grav's Markdown media action syntax, which improperly handles image query parameters, permitting an editor to set any HTML attribute on the image element. This issue affects versions before 2.0.0-beta.2 and poses a significant risk by enabling potential cross-site scripting (XSS) attacks. The vulnerability was addressed in the release of version 2.0.0-beta.2.

Affected Version(s)

grav < 2.0.0-beta.2

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.