4.9

CVE-2025-66303

Exploit
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A Denial of Service (DoS) vulnerability has been identified in Grav related to the handling of scheduled_at parameters. Specifically, the application fails to properly sanitize input for cron expressions. By manipulating the scheduled_at parameter with a malicious input, such as a single quote, the application admin panel becomes non-functional, causing significant disruptions to administrative operations. The only way to recover from this issue is to manually access the host server and modify the backup.yaml file to correct the corrupted cron expression. This vulnerability is fixed in 1.8.0-beta.27.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GetgravGrav Version < 1.8.0
GetgravGrav Version1.8.0 Updatebeta1
GetgravGrav Version1.8.0 Updatebeta10
GetgravGrav Version1.8.0 Updatebeta11
GetgravGrav Version1.8.0 Updatebeta12
GetgravGrav Version1.8.0 Updatebeta13
GetgravGrav Version1.8.0 Updatebeta14
GetgravGrav Version1.8.0 Updatebeta15
GetgravGrav Version1.8.0 Updatebeta16
GetgravGrav Version1.8.0 Updatebeta17
GetgravGrav Version1.8.0 Updatebeta18
GetgravGrav Version1.8.0 Updatebeta19
GetgravGrav Version1.8.0 Updatebeta2
GetgravGrav Version1.8.0 Updatebeta20
GetgravGrav Version1.8.0 Updatebeta21
GetgravGrav Version1.8.0 Updatebeta22
GetgravGrav Version1.8.0 Updatebeta23
GetgravGrav Version1.8.0 Updatebeta24
GetgravGrav Version1.8.0 Updatebeta25
GetgravGrav Version1.8.0 Updatebeta26
GetgravGrav Version1.8.0 Updatebeta3
GetgravGrav Version1.8.0 Updatebeta4
GetgravGrav Version1.8.0 Updatebeta5
GetgravGrav Version1.8.0 Updatebeta6
GetgravGrav Version1.8.0 Updatebeta7
GetgravGrav Version1.8.0 Updatebeta8
GetgravGrav Version1.8.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.214
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.