Home

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

PUBLISHED Reserved 2025-11-26 | Published 2025-12-01 | Updated 2025-12-03 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 1.8.0-beta.27
affected

References

github.com/...v/grav/security/advisories/GHSA-j422-qmxp-hv94 exploit

github.com/...v/grav/security/advisories/GHSA-j422-qmxp-hv94

github.com/...ommit/ed640a13143c4177af013cf001969ed2c5e197ee

cve.org (CVE-2025-66302)

nvd.nist.gov (CVE-2025-66302)

Download JSON