<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Yaml-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/yaml-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 21:19:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/yaml-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Grav CMS API Blueprint Upload Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-grav-api-privesc/</link><pubDate>Wed, 06 May 2026 21:19:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-grav-api-privesc/</guid><description>A low-privileged authenticated API user with `api.media.write` can abuse `/api/v1/blueprint-upload` in Grav CMS to write an arbitrary YAML file into `user/accounts/`, enabling creation of a super-admin account and leading to full administrative compromise of the Grav API.</description><content:encoded><![CDATA[<p>A vulnerability in Grav CMS version <code>2.0.0-beta.2</code> allows a low-privileged, authenticated API user to escalate privileges to a super administrator. This flaw resides in the <code>/api/v1/blueprint-upload</code> endpoint. By manipulating the <code>destination</code> and <code>scope</code> parameters, an attacker can write an arbitrary YAML file into the <code>user/accounts/</code> directory. This circumvents intended access controls, allowing the creation of a new administrator account with <code>api.super</code> privileges. Exploitation requires only <code>api.media.write</code> access. Successful exploitation leads to complete control over the CMS management API, potentially enabling further attacks such as code execution. This vulnerability was disclosed on May 6, 2026, and poses a significant threat to Grav CMS installations using the API plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Grav CMS API using a low-privileged account with <code>api.media.write</code> permissions.</li>
<li>The attacker crafts a malicious HTTP POST request to <code>/api/v1/blueprint-upload</code>.</li>
<li>The request includes multipart form data with the <code>destination</code> parameter set to <code>self@:</code> and the <code>scope</code> parameter set to <code>users/anything</code>.</li>
<li>The request includes a <code>file</code> parameter containing a YAML file crafted to create a new admin user, including setting a plaintext password and <code>api.super</code> access.</li>
<li>The Grav CMS API resolves the file path based on the <code>destination</code> and <code>scope</code> parameters, writing the malicious YAML file to the <code>user/accounts/</code> directory.</li>
<li>The attacker authenticates to the Grav CMS API using the newly created admin user credentials defined in the YAML file.</li>
<li>The attacker successfully logs in as a super administrator, gaining full access to the Grav CMS management API.</li>
<li>The attacker leverages their elevated privileges to modify content, alter configurations, manage users, or install malicious plugins/themes, ultimately achieving complete CMS compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation grants an attacker full control over the Grav CMS instance.  An attacker can modify website content, alter configurations, manage users (including creating additional administrator accounts), install or update plugins/themes, and access system-level administration features. This can lead to complete CMS compromise, potentially resulting in data theft, defacement, or further exploitation, such as server-side code execution. The vulnerability allows any user with limited API access (<code>api.media.write</code>) to create a super administrator account, drastically increasing the attack surface and potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Grav CMS to version <code>2.0.0-beta.4</code> or later to patch the vulnerability as per the advisory (<a href="https://github.com/advisories/GHSA-6xx2-m8wv-756h)">https://github.com/advisories/GHSA-6xx2-m8wv-756h)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Grav CMS Malicious Blueprint Upload</code> to detect attempts to exploit this vulnerability by monitoring for suspicious blueprint uploads to the <code>user/accounts</code> directory.</li>
<li>Implement the Sigma rule <code>Detect Grav CMS New Admin User Creation via API</code> to identify the creation of new admin users via the API endpoint.</li>
<li>Restrict <code>api.media.write</code> permissions to only trusted users, reducing the potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>gravcms</category><category>privilege-escalation</category><category>yaml-injection</category></item></channel></rss>