Home

Description

This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/accounts/groups/Grupo endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[readableName] parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 1.11.0-beta.1.

PUBLISHED Reserved 2025-11-26 | Published 2025-12-01 | Updated 2025-12-02 | Assigner GitHub_M




MEDIUM: 6.2CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.11.0-beta.1
affected

References

github.com/...v/grav/security/advisories/GHSA-rmw5-f87r-w988 exploit

github.com/...v/grav/security/advisories/GHSA-rmw5-f87r-w988

github.com/...ommit/99f653296504f1d6408510dd2f6f20a45a26f9b0

cve.org (CVE-2025-66312)

nvd.nist.gov (CVE-2025-66312)

Download JSON