Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.
Problem types
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-201: Insertion of Sensitive Information Into Sent Data
Product status
References
github.com/...v/grav/security/advisories/GHSA-gq3g-666w-7h85
github.com/...v/grav/security/advisories/GHSA-gq3g-666w-7h85
github.com/...ommit/9d11094e4133f059688fad1e00dbe96fb6e3ead7