Skip to main content

CVE-2025-46199: n/a

Critical
VulnerabilityCVE-2025-46199cvecve-2025-46199
Published: Fri Jul 25 2025 (07/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in grav v.1.7.48 and before allows an attacker to execute arbitrary code via a crafted script to the form fields

AI-Powered Analysis

AILast updated: 07/25/2025, 18:32:42 UTC

Technical Analysis

CVE-2025-46199 is a critical Cross Site Scripting (XSS) vulnerability affecting Grav CMS version 1.7.48 and earlier. Grav is a flat-file content management system widely used for building websites without a traditional database backend. This vulnerability allows an attacker to inject and execute arbitrary scripts within form fields, exploiting insufficient input sanitization or output encoding. Because the vulnerability is classified under CWE-79, it involves improper neutralization of input during web page generation, enabling malicious scripts to run in the context of the victim's browser. The CVSS 3.1 score of 9.8 indicates an extremely severe issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). An attacker can remotely exploit this vulnerability without authentication or user interaction, potentially leading to session hijacking, data theft, defacement, or further exploitation of the affected system or its users. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat to any Grav CMS deployment that has not been patched or mitigated. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for administrators to apply any forthcoming updates or implement temporary mitigations.

Potential Impact

For European organizations using Grav CMS, this vulnerability poses a substantial risk. Grav is popular among small to medium enterprises, educational institutions, and government agencies for its simplicity and flexibility. Exploitation could lead to unauthorized access to sensitive information, defacement of public-facing websites, and compromise of user credentials or session tokens. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data breaches), and cause operational disruptions. Given the critical severity and no requirement for authentication or user interaction, attackers can automate exploitation at scale, potentially targeting multiple European entities simultaneously. The impact is especially severe for organizations relying on Grav for public portals or internal tools without additional security layers, as attackers could leverage the XSS to pivot into more damaging attacks such as phishing, malware distribution, or lateral movement within networks.

Mitigation Recommendations

Immediate mitigation steps include: 1) Monitoring official Grav CMS channels for patches and applying updates promptly once available. 2) Implementing Web Application Firewalls (WAFs) with rules to detect and block typical XSS payloads targeting form fields. 3) Employing Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of injected scripts. 4) Conducting thorough input validation and output encoding on all form inputs at the application level if custom modifications exist. 5) Restricting access to administrative interfaces and sensitive forms via IP whitelisting or VPNs to reduce exposure. 6) Educating users and administrators about the risks of XSS and encouraging regular security audits. 7) Utilizing security scanners to detect XSS vulnerabilities in deployed Grav instances. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6883ca47ad5a09ad0055b7bc

Added to database: 7/25/2025, 6:17:43 PM

Last enriched: 7/25/2025, 6:32:42 PM

Last updated: 7/26/2025, 5:47:03 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats