CVE-2021-47812

GravCMS 1.10.7 contains an unauthenticated vulnerability that allows remote attackers to write arbitrary YAML configuration and execute PHP code through the scheduler endpoint. Attackers can exploit the admin-nonce parameter to inject base64-encoded payloads and create malicious custom jobs with system command execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgrav:grav:1.10.7:*:*:*:*:*:*:*

History

30 Jan 2026, 00:47

Type Values Removed Values Added
References () https://getgrav.org - () https://getgrav.org - Product
References () https://www.exploit-db.com/exploits/49973 - () https://www.exploit-db.com/exploits/49973 - Exploit
References () https://www.vulncheck.com/advisories/gravcms-arbitrary-yaml-writeupdate-unauthenticated - () https://www.vulncheck.com/advisories/gravcms-arbitrary-yaml-writeupdate-unauthenticated - Third Party Advisory
CPE cpe:2.3:a:getgrav:grav:1.10.7:*:*:*:*:*:*:*
First Time Getgrav grav
Getgrav

16 Jan 2026, 22:16

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/49973 - () https://www.exploit-db.com/exploits/49973 -

16 Jan 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 00:16

Updated : 2026-01-30 00:47


NVD link : CVE-2021-47812

Mitre link : CVE-2021-47812

CVE.ORG link : CVE-2021-47812


JSON object : View

Products Affected

getgrav

  • grav
CWE
CWE-862

Missing Authorization