The Grav admin plugin prior to version 1.10.11 does not correctly verify caller's privileges. As a consequence, users with the permission `admin.login` can install third-party plugins and their dependencies. By installing the right plugin, an attacker can obtain an arbitrary code execution primitive and elevate their privileges on the instance. The vulnerability has been addressed in version 1.10.11. As a mitigation blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-04-13T19:45:15
Updated: 2024-08-03T22:02:51.967Z
Reserved: 2021-03-30T00:00:00
Link: CVE-2021-29439
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-04-13T20:15:22.297
Modified: 2024-11-21T06:01:06.040
Link: CVE-2021-29439
Redhat
No data.