Getgrav

Grav

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 01.12.2025 21:46:00
  • Zuletzt bearbeitet 03.12.2025 18:45:11

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although di...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 01.12.2025 21:43:29
  • Zuletzt bearbeitet 03.12.2025 18:50:11

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Denial of Service (DoS) vulnerability was identified in the "Languages" submenu of the Grav admin configuration panel (/admin/config/system). Specifically, the Supported parameter fails to ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 01.12.2025 21:40:11
  • Zuletzt bearbeitet 03.12.2025 18:57:54

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to pri...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 01.12.2025 21:35:47
  • Zuletzt bearbeitet 03.12.2025 16:03:09

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A Denial of Service (DoS) vulnerability has been identified in Grav related to the handling of scheduled_at parameters. Specifically, the application fails to properly sanitize input for cron...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 01.12.2025 21:33:40
  • Zuletzt bearbeitet 03.12.2025 16:00:53

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. Th...

Exploit
  • EPSS 31.92%
  • Veröffentlicht 01.12.2025 21:30:43
  • Zuletzt bearbeitet 03.12.2025 15:50:19

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now a...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 01.12.2025 21:19:00
  • Zuletzt bearbeitet 03.12.2025 15:45:05

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store ha...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 01.12.2025 21:15:11
  • Zuletzt bearbeitet 03.12.2025 15:41:59

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, Grav CMS is vulnerable to a Server-Side Template Injection (SSTI) that allows any authenticated user with editor permissions to execute arbitrary code on the remote server, bypassing the exis...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 01.12.2025 21:10:43
  • Zuletzt bearbeitet 03.12.2025 15:51:09

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, having a simple form on site can reveal the whole Grav configuration details (including plugin configuration details) by using the correct POST payload to exploit a Server-Side Template (SST)...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 01.12.2025 21:05:44
  • Zuletzt bearbeitet 03.12.2025 15:58:41

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a user with admin panel access and permissions to create or edit pages in Grav CMS can enable Twig processing in the page frontmatter. By injecting malicious Twig expressions, the user can es...