A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
References
| Link | Resource |
|---|---|
| https://github.com/binneko/CVE-2025-50286 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2025, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/binneko/CVE-2025-50286 - Exploit, Third Party Advisory | |
| First Time |
Getgrav grav
Getgrav |
|
| CPE | cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:* |
Information
Published : 2025-08-06 15:15
Updated : 2025-11-07 19:18
NVD link : CVE-2025-50286
Mitre link : CVE-2025-50286
CVE.ORG link : CVE-2025-50286
JSON object : View
Products Affected
getgrav
- grav
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
