CVE-2024-28118
- EPSS 0.51%
- Veröffentlicht 21.03.2024 22:15:12
- Zuletzt bearbeitet 02.01.2025 22:59:47
Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from Grav context, an attacker can redefine config variable. As a result, attacker can bypass a previous SSTI...
CVE-2024-28117
- EPSS 0.48%
- Veröffentlicht 21.03.2024 22:15:11
- Zuletzt bearbeitet 02.01.2025 22:58:56
Grav is an open-source, flat-file content management system. Prior to version 1.7.45, Grav validates accessible functions through the Utils::isDangerousFunction function, but does not impose restrictions on twig functions like twig_array_map, allowin...
CVE-2024-28116
- EPSS 56.99%
- Veröffentlicht 21.03.2024 22:15:11
- Zuletzt bearbeitet 02.01.2025 22:57:51
Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code ...
CVE-2024-27921
- EPSS 8.77%
- Veröffentlicht 21.03.2024 22:15:11
- Zuletzt bearbeitet 02.01.2025 22:57:17
Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .c...
CVE-2024-27923
- EPSS 6.92%
- Veröffentlicht 21.03.2024 02:52:21
- Zuletzt bearbeitet 02.01.2025 23:02:44
Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the `frontmatter` feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Ve...
CVE-2023-31506
- EPSS 0.05%
- Veröffentlicht 09.02.2024 07:15:59
- Zuletzt bearbeitet 16.06.2025 19:15:21
A cross-site scripting (XSS) vulnerability in Grav versions 1.7.44 and before, allows remote authenticated attackers to execute arbitrary web scripts or HTML via the onmouseover attribute of an ISINDEX element.
CVE-2023-37897
- EPSS 0.11%
- Veröffentlicht 18.07.2023 21:15:15
- Zuletzt bearbeitet 21.11.2024 08:12:25
Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using `|map`, `|filter` and `|reduce` twigs implemented in the commit `71bbed1` introduce...
CVE-2023-34448
- EPSS 6.76%
- Veröffentlicht 14.06.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:16
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by ...
CVE-2023-34253
- EPSS 1.57%
- Veröffentlicht 14.06.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 08:06:52
Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in...
CVE-2023-34452
- EPSS 0.62%
- Veröffentlicht 14.06.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:17
Grav is a flat-file content management system. In versions 1.7.42 and prior, the "/forgot_password" page has a self-reflected cross-site scripting vulnerability that can be exploited by injecting a script into the "email" parameter of the request. Wh...