6.8

CVE-2025-66302

Exploit
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GetgravGrav Version < 1.8.0
GetgravGrav Version1.8.0 Updatebeta1
GetgravGrav Version1.8.0 Updatebeta10
GetgravGrav Version1.8.0 Updatebeta11
GetgravGrav Version1.8.0 Updatebeta12
GetgravGrav Version1.8.0 Updatebeta13
GetgravGrav Version1.8.0 Updatebeta14
GetgravGrav Version1.8.0 Updatebeta15
GetgravGrav Version1.8.0 Updatebeta16
GetgravGrav Version1.8.0 Updatebeta17
GetgravGrav Version1.8.0 Updatebeta18
GetgravGrav Version1.8.0 Updatebeta19
GetgravGrav Version1.8.0 Updatebeta2
GetgravGrav Version1.8.0 Updatebeta20
GetgravGrav Version1.8.0 Updatebeta21
GetgravGrav Version1.8.0 Updatebeta22
GetgravGrav Version1.8.0 Updatebeta23
GetgravGrav Version1.8.0 Updatebeta24
GetgravGrav Version1.8.0 Updatebeta25
GetgravGrav Version1.8.0 Updatebeta26
GetgravGrav Version1.8.0 Updatebeta3
GetgravGrav Version1.8.0 Updatebeta4
GetgravGrav Version1.8.0 Updatebeta5
GetgravGrav Version1.8.0 Updatebeta6
GetgravGrav Version1.8.0 Updatebeta7
GetgravGrav Version1.8.0 Updatebeta8
GetgravGrav Version1.8.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.218
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 2.3 4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
security-advisories@github.com 6.8 2.3 4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.