Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gqxx-248x-g29f

Опубликовано: 02 дек. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.8

Описание

Grav Admin Plugin vulnerable to Cross-Site Scripting (XSS) Stored endpoint /admin/config/site parameter data[taxonomies]

Summary

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/config/site endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[taxonomies] parameter. The injected payload is stored on the server and automatically executed in the browser of any user who accesses the affected site configuration, resulting in a persistent attack vector.


Details

Vulnerable Endpoint: POST /admin/config/site
Parameter: data[taxonomies]

The application does not properly validate or sanitize input in the data[taxonomies] field. As a result, an attacker can inject JavaScript code, which is stored in the site configuration and later rendered in the administrative interface or site output, causing automatic execution in the user's browser.


PoC

Payload:

"><script>alert('XSS-PoC')</script>

Steps to Reproduce:

  1. Log in to the Grav Admin Panel with sufficient permissions to modify site configuration.

  2. Navigate to Configuration > Site.

  3. In the Taxonomies Types field (which maps to data[taxonomies]), insert the payload above:

    "><script>alert('XSS-PoC')</script>

  4. Save the configuration.

Pasted image 20250718195942
  1. Go on Pages and click on one of them
Pasted image 20250718200306
  1. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability.
Pasted image 20250718200353
  1. The HTTP request submitted during this process contains the vulnerable parameter and payload:
Pasted image 20250718200445

Impact

Stored XSS attacks can lead to severe consequences, including:

  • Session hijacking: Stealing cookies or authentication tokens to impersonate users

  • Credential theft: Harvesting usernames and passwords using malicious scripts

  • Malware delivery: Distributing unwanted or harmful code to victims

  • Privilege escalation: Compromising administrative users through persistent scripts

  • Data manipulation or defacement: Changing or disrupting site content

  • Reputation damage: Eroding trust among site users and administrators


Discoverer

Marcelo Queiroz

by CVE-Hunters

Пакеты

Наименование

getgrav/grav

composer
Затронутые версииВерсия исправления

< 1.8.0-beta.27

1.8.0-beta.27

EPSS

Процентиль: 9%
0.00032
Низкий

6.8 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.4
nvd
2 месяца назад

This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/config/site endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[taxonomies] parameter. The injected payload is stored on the server and automatically executed in the browser of any user who accesses the affected site configuration, resulting in a persistent attack vector. This vulnerability is fixed in 1.11.0-beta.1.

EPSS

Процентиль: 9%
0.00032
Низкий

6.8 Medium

CVSS4

Дефекты

CWE-79