Home

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.

PUBLISHED Reserved 2025-11-26 | Published 2025-12-01 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 1.8.0-beta.27
affected

References

github.com/...v/grav/security/advisories/GHSA-4cwq-j7jv-qmwg exploit

github.com/...v/grav/security/advisories/GHSA-4cwq-j7jv-qmwg

github.com/...ommit/b7e1958a6e807ac14919447b60e5204a2ea77f62

cve.org (CVE-2025-66306)

nvd.nist.gov (CVE-2025-66306)

Download JSON