Home

Description

This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/config/site endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[taxonomies] parameter. The injected payload is stored on the server and automatically executed in the browser of any user who accesses the affected site configuration, resulting in a persistent attack vector. This vulnerability is fixed in 1.11.0-beta.1.

PUBLISHED Reserved 2025-11-26 | Published 2025-12-01 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 6.8CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.11.0-beta.1
affected

References

github.com/...v/grav/security/advisories/GHSA-gqxx-248x-g29f exploit

github.com/...v/grav/security/advisories/GHSA-gqxx-248x-g29f

github.com/...ommit/99f653296504f1d6408510dd2f6f20a45a26f9b0

cve.org (CVE-2025-66308)

nvd.nist.gov (CVE-2025-66308)

Download JSON