8.5

CVE-2025-66300

Exploit
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GetgravGrav Version < 1.8.0
GetgravGrav Version1.8.0 Updatebeta1
GetgravGrav Version1.8.0 Updatebeta10
GetgravGrav Version1.8.0 Updatebeta11
GetgravGrav Version1.8.0 Updatebeta12
GetgravGrav Version1.8.0 Updatebeta13
GetgravGrav Version1.8.0 Updatebeta14
GetgravGrav Version1.8.0 Updatebeta15
GetgravGrav Version1.8.0 Updatebeta16
GetgravGrav Version1.8.0 Updatebeta17
GetgravGrav Version1.8.0 Updatebeta18
GetgravGrav Version1.8.0 Updatebeta19
GetgravGrav Version1.8.0 Updatebeta2
GetgravGrav Version1.8.0 Updatebeta20
GetgravGrav Version1.8.0 Updatebeta21
GetgravGrav Version1.8.0 Updatebeta22
GetgravGrav Version1.8.0 Updatebeta23
GetgravGrav Version1.8.0 Updatebeta24
GetgravGrav Version1.8.0 Updatebeta25
GetgravGrav Version1.8.0 Updatebeta26
GetgravGrav Version1.8.0 Updatebeta3
GetgravGrav Version1.8.0 Updatebeta4
GetgravGrav Version1.8.0 Updatebeta5
GetgravGrav Version1.8.0 Updatebeta6
GetgravGrav Version1.8.0 Updatebeta7
GetgravGrav Version1.8.0 Updatebeta8
GetgravGrav Version1.8.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.23
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 8.5 3.1 4.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.