Getgrav

Grav

53 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.07%
  • Veröffentlicht 01.12.2025 21:53:43
  • Zuletzt bearbeitet 03.12.2025 21:58:18

This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a user enumeration and email disclosure vulnerability exists in Grav. The "Forgot Passwo...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 01.12.2025 21:46:00
  • Zuletzt bearbeitet 03.12.2025 18:45:11

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although di...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 01.12.2025 21:43:29
  • Zuletzt bearbeitet 03.12.2025 18:50:11

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Denial of Service (DoS) vulnerability was identified in the "Languages" submenu of the Grav admin configuration panel (/admin/config/system). Specifically, the Supported parameter fails to ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 01.12.2025 21:40:11
  • Zuletzt bearbeitet 03.12.2025 18:57:54

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to pri...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 01.12.2025 21:35:47
  • Zuletzt bearbeitet 03.12.2025 16:03:09

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A Denial of Service (DoS) vulnerability has been identified in Grav related to the handling of scheduled_at parameters. Specifically, the application fails to properly sanitize input for cron...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 01.12.2025 21:33:40
  • Zuletzt bearbeitet 03.12.2025 16:00:53

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. Th...

Exploit
  • EPSS 28.69%
  • Veröffentlicht 01.12.2025 21:30:43
  • Zuletzt bearbeitet 03.12.2025 15:50:19

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now a...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 01.12.2025 21:19:00
  • Zuletzt bearbeitet 03.12.2025 15:45:05

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store ha...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 01.12.2025 21:15:11
  • Zuletzt bearbeitet 03.12.2025 15:41:59

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, Grav CMS is vulnerable to a Server-Side Template Injection (SSTI) that allows any authenticated user with editor permissions to execute arbitrary code on the remote server, bypassing the exis...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 01.12.2025 21:10:43
  • Zuletzt bearbeitet 03.12.2025 15:51:09

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, having a simple form on site can reveal the whole Grav configuration details (including plugin configuration details) by using the correct POST payload to exploit a Server-Side Template (SST)...