CVE-2025-66302

6.8 MEDIUM
Published: December 01, 2025 Modified: December 03, 2025

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/getgrav/grav/security/advisories/GHSA-j422-qmxp-hv94
Source: security-advisories@github.com
Exploit Third Party Advisory
https://github.com/getgrav/grav/security/advisories/GHSA-j422-qmxp-hv94
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.8 / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

getgrav