Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.
References
| Link | Resource |
|---|---|
| https://github.com/getgrav/grav/commit/b7e1958a6e807ac14919447b60e5204a2ea77f62 | Patch |
| https://github.com/getgrav/grav/security/advisories/GHSA-4cwq-j7jv-qmwg | Exploit Vendor Advisory |
| https://github.com/getgrav/grav/security/advisories/GHSA-4cwq-j7jv-qmwg | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Dec 2025, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/getgrav/grav/commit/b7e1958a6e807ac14919447b60e5204a2ea77f62 - Patch | |
| References | () https://github.com/getgrav/grav/security/advisories/GHSA-4cwq-j7jv-qmwg - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:getgrav:grav:1.8.0:beta21:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta17:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta24:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta25:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta15:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta20:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta22:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta11:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta10:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta3:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta18:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta1:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta13:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta5:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta9:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta16:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta19:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta14:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta4:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta26:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta7:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta2:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta8:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta23:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta6:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta12:*:*:*:*:*:* |
|
| First Time |
Getgrav
Getgrav grav |
02 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/getgrav/grav/security/advisories/GHSA-4cwq-j7jv-qmwg - |
01 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-01 22:15
Updated : 2025-12-03 18:45
NVD link : CVE-2025-66306
Mitre link : CVE-2025-66306
CVE.ORG link : CVE-2025-66306
JSON object : View
Products Affected
getgrav
- grav
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
