CVE-2026-44738

Severity CVSS v4.0:
Pending analysis
Type:
CWE-200 Information Leak / Disclosure
Publication date:
11/05/2026
Last modified:
14/05/2026

Description

Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin secrets (SMTP passwords, AWS keys, OAuth client secrets, API tokens) — into the rendered HTML. No administrator privileges are required. This vulnerability is fixed in 2.0.0-rc.2.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* 2.0.0 (excluding)
cpe:2.3:a:getgrav:grav:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:2.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:2.0.0:rc1:*:*:*:*:*:*