Home

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Denial of Service (DoS) vulnerability was identified in the "Languages" submenu of the Grav admin configuration panel (/admin/config/system). Specifically, the Supported parameter fails to properly validate user input. If a malformed value is inserted—such as a single forward slash (/) or an XSS test string—it causes a fatal regular expression parsing error on the server. This leads to application-wide failure due to the use of the preg_match() function with an improperly constructed regular expression, resulting in an error. Once triggered, the site becomes completely unavailable to all users. This vulnerability is fixed in 1.8.0-beta.27.

PUBLISHED Reserved 2025-11-26 | Published 2025-12-01 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-248: Uncaught Exception

Product status

< 1.8.0-beta.27
affected

References

github.com/...v/grav/security/advisories/GHSA-m8vh-v6r6-w7p6 exploit

github.com/...v/grav/security/advisories/GHSA-m8vh-v6r6-w7p6

github.com/...ommit/ed640a13143c4177af013cf001969ed2c5e197ee

cve.org (CVE-2025-66305)

nvd.nist.gov (CVE-2025-66305)

Download JSON