Impact
The Grav API Plugin contains an insecure direct object reference in the UsersController::update method. Before version 1.0.0-beta.15 any authenticated user with basic API access can alter their permission configuration. This flaw permits an attacker to elevate privileges to Super Administrator, granting unrestricted control over the site and the possibility to execute code on the server.
Affected Systems
The vulnerability affects the Grav API Plugin provided by getgrav. All installations running the Grav API Plugin prior to 1.0.0-beta.15 are susceptible, regardless of Grav CMS version.
Risk and Exploitability
The CVSS score of 8.8 places the issue in the high severity range. Exploitation requires authentication and API access, but no additional conditions are listed. EPSS is not available, and the vulnerability is not in the CISA KEV catalog. An attacker can exploit the flaw remotely if they have any authenticated API session, making it a significant risk for sites exposing the API.
OpenCVE Enrichment
Github GHSA