Логотип exploitDog
bind:CVE-2025-66302
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-66302

Количество 2

Количество 2

nvd логотип

CVE-2025-66302

2 месяца назад

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-j422-qmxp-hv94

2 месяца назад

Grav vulnerable to Path Traversal allowing server files backup

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-66302

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

CVSS3: 6.8
0%
Низкий
2 месяца назад
github логотип
GHSA-j422-qmxp-hv94

Grav vulnerable to Path Traversal allowing server files backup

CVSS3: 6.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу