Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.
References
| Link | Resource |
|---|---|
| https://github.com/getgrav/grav/commit/9d11094e4133f059688fad1e00dbe96fb6e3ead7 | Patch |
| https://github.com/getgrav/grav/security/advisories/GHSA-gq3g-666w-7h85 | Exploit Vendor Advisory |
| https://github.com/getgrav/grav/security/advisories/GHSA-gq3g-666w-7h85 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Getgrav
Getgrav grav |
|
| References | () https://github.com/getgrav/grav/commit/9d11094e4133f059688fad1e00dbe96fb6e3ead7 - Patch | |
| References | () https://github.com/getgrav/grav/security/advisories/GHSA-gq3g-666w-7h85 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:getgrav:grav:1.8.0:beta21:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta17:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta24:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta25:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta15:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta20:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta22:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta11:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta10:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta3:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta18:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta1:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta13:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta5:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta9:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta16:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta19:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta14:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta4:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta26:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta7:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta2:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta8:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta23:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta6:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta12:*:*:*:*:*:* |
02 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/getgrav/grav/security/advisories/GHSA-gq3g-666w-7h85 - |
01 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-01 22:15
Updated : 2025-12-03 18:57
NVD link : CVE-2025-66304
Mitre link : CVE-2025-66304
CVE.ORG link : CVE-2025-66304
JSON object : View
Products Affected
getgrav
- grav
