Home

Description

A vulnerability was found in Grav CMS up to 1.7.49.5/2.0.0-beta.1. Affected by this vulnerability is the function FileCache::doGet of the file system/src/Grav/Framework/Cache/Adapter/FileCache.php of the component Cache Value Handler. The manipulation results in deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 2.0.0-beta.2 addresses this issue. The patch is identified as c66dfeb5f. The affected component should be upgraded.

PUBLISHED Reserved 2026-04-28 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 5.0CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
4.6AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Deserialization

Improper Input Validation

Product status

1.7.49.0
affected

1.7.49.1
affected

1.7.49.2
affected

1.7.49.3
affected

1.7.49.4
affected

1.7.49.5
affected

2.0.0-beta.0
affected

2.0.0-beta.1
affected

2.0.0-beta.2
unaffected

Timeline

2026-04-28:Advisory disclosed
2026-04-28:VulDB entry created
2026-04-28:VulDB entry last update

Credits

s4nnty (VulDB User) reporter

References

vuldb.com/vuln/359965 (VDB-359965 | Grav CMS Cache Value FileCache.php doGet deserialization) vdb-entry technical-description

vuldb.com/vuln/359965/cti (VDB-359965 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/798732 (Submit #798732 | Trilby Media Grav CMS >= 1.7.44, <= 1.7.49.5 Deserialization) third-party-advisory

github.com/...elsantiago/grav-cms-filecache-object-injection exploit

github.com/...v/grav/security/advisories/GHSA-gwfr-jfjf-92vv related

github.com/getgrav/grav/commit/c66dfeb5f patch

cve.org (CVE-2026-7317)

nvd.nist.gov (CVE-2026-7317)

Download JSON