CVE-2026-44738
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
11/05/2026
Last modified:
14/05/2026
Description
Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin secrets (SMTP passwords, AWS keys, OAuth client secrets, API tokens) — into the rendered HTML. No administrator privileges are required. This vulnerability is fixed in 2.0.0-rc.2.
Impact
Base Score 3.x
7.70
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* | 2.0.0 (excluding) | |
| cpe:2.3:a:getgrav:grav:2.0.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:getgrav:grav:2.0.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:getgrav:grav:2.0.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:getgrav:grav:2.0.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:getgrav:grav:2.0.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



