CVE-2025-50286

A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
References
Link Resource
https://github.com/binneko/CVE-2025-50286 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:*

History

07 Nov 2025, 19:18

Type Values Removed Values Added
References () https://github.com/binneko/CVE-2025-50286 - () https://github.com/binneko/CVE-2025-50286 - Exploit, Third Party Advisory
First Time Getgrav grav
Getgrav
CPE cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:*

Information

Published : 2025-08-06 15:15

Updated : 2025-11-07 19:18


NVD link : CVE-2025-50286

Mitre link : CVE-2025-50286

CVE.ORG link : CVE-2025-50286


JSON object : View

Products Affected

getgrav

  • grav
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type