Back to CVE risk briefs

External risk intelligence

Grav Login plugin could allow external attackers to gain full administrative access

The Grav web platform could allow external attackers to register new accounts with administrative privileges when user registration is enabled, potentially exposing the system to full administrative control over configuration and content. This vulnerability impacts the platform's overall integrity and management.

NVD published May 11, 2026 (4 days ago)

External risk briefCRITICAL

CVE-2026-42613

Halo Surface Signal

4/ 5

The vulnerability affects the registration feature of the Grav web platform. Content management systems are typically deployed as public-facing websites. When user registration is enabled, the registration endpoint is directly reachable by external users over the internet, which is a common deployment pattern for such web applications.

Exposure facts

H – Horizon Alert

A vulnerability has been identified within the registration feature of the Grav web platform that could allow unauthorized individuals to register new accounts with administrative privileges. Because the system may fail to properly validate information provided during account creation, an unauthenticated user might successfully escalate their access levels. If your platform currently permits user registration, this issue represents a significant risk to your system's integrity and control.

A – Asset Exposure

The Grav web platform’s Login plugin may be affected when user registration is enabled and configured to permit external control over account settings. In this specific scenario, an unauthorized user could self-register and grant themselves elevated admin access to the system. This exposure could lead to administrative control over the platform's configuration and managed content.

L – Live Threat

The available context for this issue does not indicate active exploitation or observed targeting at this time. While the vulnerability theoretically allows for unauthorized privilege escalation, there are no current reports of public exploit code or in-the-wild activity. Consequently, the likelihood of immediate, widespread threat appears low based on the information currently available.

O – Operational Fix

Please prioritize applying the latest security updates provided by the vendor for your web platform to resolve this registration vulnerability. In the interim, we recommend verifying whether user registration is enabled within your configuration settings and disabling this feature if it is not strictly required for business operations. Your technical team should follow the official vendor guidance to ensure your environment is properly secured.

References