8.8

CVE-2025-66299

Exploit
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, Grav CMS is vulnerable to a Server-Side Template Injection (SSTI) that allows any authenticated user with editor permissions to execute arbitrary code on the remote server, bypassing the existing security sandbox. Since the security sandbox does not fully protect the Twig object, it is possible to interact with it (e.g., call methods, read/write attributes) through maliciously crafted Twig template directives injected into a web page. This allows an authenticated editor to add arbitrary functions to the Twig attribute system.twig.safe_filters, effectively bypassing the Grav CMS sandbox. This vulnerability is fixed in 1.8.0-beta.27.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GetgravGrav Version < 1.8.0
GetgravGrav Version1.8.0 Updatebeta1
GetgravGrav Version1.8.0 Updatebeta10
GetgravGrav Version1.8.0 Updatebeta11
GetgravGrav Version1.8.0 Updatebeta12
GetgravGrav Version1.8.0 Updatebeta13
GetgravGrav Version1.8.0 Updatebeta14
GetgravGrav Version1.8.0 Updatebeta15
GetgravGrav Version1.8.0 Updatebeta16
GetgravGrav Version1.8.0 Updatebeta17
GetgravGrav Version1.8.0 Updatebeta18
GetgravGrav Version1.8.0 Updatebeta19
GetgravGrav Version1.8.0 Updatebeta2
GetgravGrav Version1.8.0 Updatebeta20
GetgravGrav Version1.8.0 Updatebeta21
GetgravGrav Version1.8.0 Updatebeta22
GetgravGrav Version1.8.0 Updatebeta23
GetgravGrav Version1.8.0 Updatebeta24
GetgravGrav Version1.8.0 Updatebeta25
GetgravGrav Version1.8.0 Updatebeta26
GetgravGrav Version1.8.0 Updatebeta3
GetgravGrav Version1.8.0 Updatebeta4
GetgravGrav Version1.8.0 Updatebeta5
GetgravGrav Version1.8.0 Updatebeta6
GetgravGrav Version1.8.0 Updatebeta7
GetgravGrav Version1.8.0 Updatebeta8
GetgravGrav Version1.8.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.289
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine

The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine.

CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.