CVE-2025-66300: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.
AI Analysis
Technical Summary
CVE-2025-66300 is a path traversal vulnerability classified under CWE-22, discovered in the Grav CMS platform prior to version 1.8.0-beta.27. Grav is a flat-file CMS that stores content and configuration in files rather than a database. The vulnerability arises because a low-privilege user with page editing permissions can exploit the 'Frontmatter' form to perform directory traversal attacks, allowing them to read arbitrary files on the server. Specifically, attackers can access Grav user account files located at /grav/user/accounts/*.yaml, which contain sensitive information such as hashed passwords, two-factor authentication (2FA) secrets, and password reset tokens. By reading these files, an attacker can either crack the hashed passwords offline or use the password reset tokens to hijack accounts, effectively escalating their privileges and gaining unauthorized access. The vulnerability requires no user interaction beyond having page editing privileges, making it easier to exploit in environments where such privileges are granted to multiple users. The CVSS v3.1 score is 8.5 (high), reflecting the network attack vector, low attack complexity, required privileges, no user interaction, and a significant confidentiality impact with limited integrity and availability impact. The flaw has been patched in Grav version 1.8.0-beta.27, and no known exploits have been reported in the wild as of the publication date. This vulnerability highlights the risks of improper input validation and insufficient restriction of file path access in web applications, especially those that rely on file-based storage.
Potential Impact
For European organizations using Grav CMS, this vulnerability poses a significant risk to the confidentiality of user credentials and sensitive authentication data. Successful exploitation can lead to unauthorized account takeovers, including administrative accounts, resulting in potential data breaches, defacement, or further lateral movement within the affected environment. Organizations handling sensitive or regulated data (e.g., personal data under GDPR) face compliance risks and reputational damage if exploited. The ability to read password reset tokens and 2FA secrets undermines multi-factor authentication protections, increasing the likelihood of persistent unauthorized access. Although the vulnerability does not directly impact system integrity or availability, the indirect consequences of account compromise can lead to data manipulation or service disruption. European entities with public-facing Grav installations, especially those with multiple content editors or contributors, are at heightened risk. The lack of known exploits in the wild suggests a window of opportunity for proactive patching before widespread attacks occur.
Mitigation Recommendations
1. Upgrade Grav CMS installations to version 1.8.0-beta.27 or later immediately to apply the official patch addressing this vulnerability. 2. Audit and restrict page editing privileges to only trusted and necessary users to minimize the attack surface. 3. Implement strict access controls and monitoring on the /grav/user/accounts/ directory to detect unauthorized access attempts. 4. Employ web application firewalls (WAFs) with rules to detect and block path traversal patterns targeting the Frontmatter form. 5. Conduct regular security reviews and penetration testing focused on file access controls within Grav and similar file-based CMS platforms. 6. Encourage users to enable strong password policies and multi-factor authentication to mitigate the impact of credential exposure. 7. Monitor logs for unusual file access patterns or failed attempts to access sensitive YAML files. 8. Consider isolating Grav installations in segmented network zones to limit lateral movement if compromise occurs. 9. Educate content editors about the risks of privilege misuse and the importance of secure credential handling. 10. Backup Grav data regularly and verify the integrity of backups to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-66300: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav
Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-66300 is a path traversal vulnerability classified under CWE-22, discovered in the Grav CMS platform prior to version 1.8.0-beta.27. Grav is a flat-file CMS that stores content and configuration in files rather than a database. The vulnerability arises because a low-privilege user with page editing permissions can exploit the 'Frontmatter' form to perform directory traversal attacks, allowing them to read arbitrary files on the server. Specifically, attackers can access Grav user account files located at /grav/user/accounts/*.yaml, which contain sensitive information such as hashed passwords, two-factor authentication (2FA) secrets, and password reset tokens. By reading these files, an attacker can either crack the hashed passwords offline or use the password reset tokens to hijack accounts, effectively escalating their privileges and gaining unauthorized access. The vulnerability requires no user interaction beyond having page editing privileges, making it easier to exploit in environments where such privileges are granted to multiple users. The CVSS v3.1 score is 8.5 (high), reflecting the network attack vector, low attack complexity, required privileges, no user interaction, and a significant confidentiality impact with limited integrity and availability impact. The flaw has been patched in Grav version 1.8.0-beta.27, and no known exploits have been reported in the wild as of the publication date. This vulnerability highlights the risks of improper input validation and insufficient restriction of file path access in web applications, especially those that rely on file-based storage.
Potential Impact
For European organizations using Grav CMS, this vulnerability poses a significant risk to the confidentiality of user credentials and sensitive authentication data. Successful exploitation can lead to unauthorized account takeovers, including administrative accounts, resulting in potential data breaches, defacement, or further lateral movement within the affected environment. Organizations handling sensitive or regulated data (e.g., personal data under GDPR) face compliance risks and reputational damage if exploited. The ability to read password reset tokens and 2FA secrets undermines multi-factor authentication protections, increasing the likelihood of persistent unauthorized access. Although the vulnerability does not directly impact system integrity or availability, the indirect consequences of account compromise can lead to data manipulation or service disruption. European entities with public-facing Grav installations, especially those with multiple content editors or contributors, are at heightened risk. The lack of known exploits in the wild suggests a window of opportunity for proactive patching before widespread attacks occur.
Mitigation Recommendations
1. Upgrade Grav CMS installations to version 1.8.0-beta.27 or later immediately to apply the official patch addressing this vulnerability. 2. Audit and restrict page editing privileges to only trusted and necessary users to minimize the attack surface. 3. Implement strict access controls and monitoring on the /grav/user/accounts/ directory to detect unauthorized access attempts. 4. Employ web application firewalls (WAFs) with rules to detect and block path traversal patterns targeting the Frontmatter form. 5. Conduct regular security reviews and penetration testing focused on file access controls within Grav and similar file-based CMS platforms. 6. Encourage users to enable strong password policies and multi-factor authentication to mitigate the impact of credential exposure. 7. Monitor logs for unusual file access patterns or failed attempts to access sensitive YAML files. 8. Consider isolating Grav installations in segmented network zones to limit lateral movement if compromise occurs. 9. Educate content editors about the risks of privilege misuse and the importance of secure credential handling. 10. Backup Grav data regularly and verify the integrity of backups to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-26T23:11:46.394Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e07e33937fa579fd7fc6c
Added to database: 12/1/2025, 9:25:55 PM
Last enriched: 12/1/2025, 9:40:57 PM
Last updated: 12/1/2025, 10:56:07 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from
MediumCVE-2025-66448: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2025-66401: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in kapilduraphe mcp-watch
CriticalCVE-2025-66312: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumCVE-2025-66311: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.