Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65186: n/a

0
Medium
VulnerabilityCVE-2025-65186cvecve-2025-65186
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Grav CMS 1.7.49 is vulnerable to Cross Site Scripting (XSS). The page editor allows authenticated users to edit page content via a Markdown editor. The editor fails to properly sanitize <script> tags, allowing stored XSS payloads to execute when pages are viewed in the admin interface.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:51:47 UTC

Technical Analysis

CVE-2025-65186 identifies a stored Cross Site Scripting (XSS) vulnerability in Grav CMS version 1.7.49. The vulnerability arises from improper sanitization of <script> tags within the Markdown editor used by authenticated users to edit page content. When a user with editing privileges inserts malicious JavaScript code into the page content, the payload is stored persistently and executed whenever the affected page is viewed in the admin interface. This stored XSS flaw allows attackers to execute arbitrary scripts in the context of the CMS admin panel, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the CMS environment. The vulnerability requires the attacker to have authenticated access to the CMS and some user interaction (viewing the malicious page). The CVSS 3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but user interaction needed, and partial confidentiality and integrity impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The CWE-79 classification confirms this is a classic XSS issue related to improper input validation and output encoding in web applications.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of content managed via Grav CMS. Attackers with authenticated access can inject malicious scripts that execute in the admin interface, potentially allowing session hijacking or unauthorized administrative actions. This can lead to defacement, data leakage, or further compromise of internal systems if the CMS is integrated with other enterprise services. The impact is heightened in organizations with multiple content editors or where CMS credentials are shared or weakly managed. Although availability is not directly affected, the trustworthiness of the CMS and its content can be undermined, impacting business operations and reputation. Given Grav CMS's usage in various sectors including media, education, and small to medium enterprises, the threat is relevant where Grav CMS is deployed for critical content management.

Mitigation Recommendations

1. Immediately restrict access to the Grav CMS page editor to trusted and trained personnel only, minimizing the number of users with editing privileges. 2. Monitor and audit all content changes in the CMS for suspicious scripts or unusual edits. 3. Implement additional input validation and output encoding at the application or web server level to sanitize <script> tags and other potentially malicious inputs in Markdown content. 4. Deploy Web Application Firewalls (WAFs) with rules to detect and block stored XSS payloads targeting Grav CMS interfaces. 5. Encourage strong authentication mechanisms such as multi-factor authentication (MFA) for CMS users to reduce risk from compromised credentials. 6. Stay alert for official patches or updates from Grav CMS developers and apply them promptly once released. 7. Educate CMS users on the risks of injecting untrusted content and safe editing practices. 8. Consider isolating the CMS admin interface behind VPN or IP whitelisting to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f11fa0eb63243a5f7cdc5

Added to database: 12/2/2025, 4:21:14 PM

Last enriched: 12/9/2025, 4:51:47 PM

Last updated: 1/16/2026, 10:11:46 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats