← Voltar para CVEs
CVE-2021-47812
CRITICAL9.8
Descricao
GravCMS 1.10.7 contains an unauthenticated vulnerability that allows remote attackers to write arbitrary YAML configuration and execute PHP code through the scheduler endpoint. Attackers can exploit the admin-nonce parameter to inject base64-encoded payloads and create malicious custom jobs with system command execution.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/16/2026
Ultima modificacao2/2/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
getgrav:grav
Fraquezas (CWE)
CWE-862
Referencias
https://getgrav.org(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49973(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/gravcms-arbitrary-yaml-writeupdate-unauthenticated(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/49973(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.