Description
A vulnerability was found in Grav CMS up to 1.7.49.5/2.0.0-beta.1. Affected by this vulnerability is the function FileCache::doGet of the file system/src/Grav/Framework/Cache/Adapter/FileCache.php of the component Cache Value Handler. The manipulation results in deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 2.0.0-beta.2 addresses this issue. The patch is identified as c66dfeb5f. The affected component should be upgraded.
Problem types
Product status
1.7.49.1
1.7.49.2
1.7.49.3
1.7.49.4
1.7.49.5
2.0.0-beta.0
2.0.0-beta.1
2.0.0-beta.2
Timeline
| 2026-04-28: | Advisory disclosed |
| 2026-04-28: | VulDB entry created |
| 2026-04-28: | VulDB entry last update |
Credits
s4nnty (VulDB User)
References
vuldb.com/vuln/359965 (VDB-359965 | Grav CMS Cache Value FileCache.php doGet deserialization)
vuldb.com/vuln/359965/cti (VDB-359965 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/798732 (Submit #798732 | Trilby Media Grav CMS >= 1.7.44, <= 1.7.49.5 Deserialization)
github.com/...elsantiago/grav-cms-filecache-object-injection
github.com/...v/grav/security/advisories/GHSA-gwfr-jfjf-92vv
github.com/getgrav/grav/commit/c66dfeb5f