Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66300: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav

0
High
VulnerabilityCVE-2025-66300cvecve-2025-66300cwe-22
Published: Mon Dec 01 2025 (12/01/2025, 21:19:00 UTC)
Source: CVE Database V5
Vendor/Project: getgrav
Product: grav

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.

AI-Powered Analysis

AILast updated: 12/08/2025, 22:17:20 UTC

Technical Analysis

CVE-2025-66300 is a path traversal vulnerability (CWE-22) identified in Grav, a popular file-based web content management system. The flaw exists in versions prior to 1.8.0-beta.27 and allows a low-privilege user with page editing capabilities to exploit the 'Frontmatter' form to read arbitrary files on the server. This is achieved by improperly limiting pathname access, enabling traversal outside the intended directory scope. Critically, this includes access to Grav user account files stored in /grav/user/accounts/*.yaml, which contain sensitive information such as hashed passwords, two-factor authentication (2FA) secrets, and password reset tokens. An attacker can leverage this information to compromise user accounts by either resetting passwords using the exposed tokens or attempting offline cracking of the hashed passwords. The vulnerability does not require user interaction but does require the attacker to have at least page editing privileges, which may be granted to low-privilege users in some deployments. The CVSS 3.1 base score is 8.5, reflecting high severity due to the ease of exploitation over the network (AV:N), low attack complexity (AC:L), and the significant confidentiality impact (C:H). The vulnerability has a limited impact on integrity (I:N) and availability (A:L). No known exploits in the wild have been reported yet. The issue was publicly disclosed on December 1, 2025, and fixed in Grav version 1.8.0-beta.27. The vulnerability highlights the risk of insufficient input validation and directory traversal protections in web platforms that handle user-generated content and configuration files.

Potential Impact

For European organizations using Grav versions prior to 1.8.0-beta.27, this vulnerability poses a significant risk to the confidentiality of user credentials and authentication secrets. Unauthorized access to hashed passwords and 2FA secrets can lead to account takeover, enabling attackers to impersonate legitimate users and escalate privileges. This can result in unauthorized content modification, data leakage, and potential lateral movement within the network. The ability to reset passwords using leaked tokens further exacerbates the risk, potentially bypassing other security controls. Organizations relying on Grav for public-facing websites or internal portals may face reputational damage, regulatory compliance issues (e.g., GDPR breaches due to unauthorized access), and operational disruptions. The limited impact on integrity and availability means the primary concern is unauthorized data disclosure and account compromise rather than service disruption. The vulnerability is particularly critical in environments where multiple users have page editing privileges, increasing the attack surface.

Mitigation Recommendations

The primary mitigation is to upgrade Grav installations to version 1.8.0-beta.27 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should restrict page editing privileges strictly to trusted users and review user roles to minimize the number of accounts with such access. Implementing strict input validation and sanitization on user-supplied data, especially in the 'Frontmatter' form, can reduce exploitation risk. Monitoring and logging access to sensitive files and unusual file read patterns can help detect exploitation attempts. Additionally, enforcing strong password policies and multi-factor authentication can mitigate the impact of compromised credentials. Regularly auditing Grav user account files and resetting passwords for accounts with suspicious activity is recommended. Network segmentation and web application firewalls (WAFs) configured to detect path traversal attempts may provide additional defense layers. Finally, organizations should maintain an incident response plan to quickly address potential breaches stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-26T23:11:46.394Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e07e33937fa579fd7fc6c

Added to database: 12/1/2025, 9:25:55 PM

Last enriched: 12/8/2025, 10:17:20 PM

Last updated: 1/16/2026, 11:05:34 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats