Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66301: CWE-285: Improper Authorization in getgrav grav

0
High
VulnerabilityCVE-2025-66301cvecve-2025-66301cwe-285
Published: Mon Dec 01 2025 (12/01/2025, 21:30:43 UTC)
Source: CVE Database V5
Vendor/Project: getgrav
Product: grav

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some important actions that could lead to further vulnerabilities. This vulnerability is fixed in 1.8.0-beta.27.

AI-Powered Analysis

AILast updated: 12/01/2025, 21:56:01 UTC

Technical Analysis

CVE-2025-66301 is an improper authorization vulnerability classified under CWE-285, discovered in the Grav CMS platform before version 1.8.0-beta.27. Grav is a flat-file CMS that uses YAML frontmatter to configure page metadata and form processing logic. The vulnerability arises because the platform fails to properly enforce authorization checks when an editor submits a POST request to modify pages via the /admin/pages/{page_name} endpoint. Specifically, editors with permissions limited to basic content changes can manipulate the data[_json][header][form] field, which contains YAML frontmatter including the 'process' section. This section controls post-submission form actions such as email notifications, redirects, or other workflows. By altering this, an attacker can change the form's behavior, potentially enabling unauthorized actions or chaining further exploits. The vulnerability does not require elevated privileges beyond editor-level access, no user interaction, and can be exploited remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, requiring limited privileges but no user interaction, and high impact on confidentiality and integrity. No known exploits are reported in the wild as of publication. The issue was addressed in Grav 1.8.0-beta.27 by enforcing stricter authorization checks on modifications to critical YAML frontmatter fields.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using Grav CMS for public-facing websites or internal portals with editor-level users. Exploitation can lead to unauthorized modification of form processing logic, potentially allowing attackers to intercept or redirect form submissions, execute unauthorized workflows, or facilitate further attacks such as phishing or data exfiltration. The impact on confidentiality and integrity is high, as sensitive data submitted via forms could be compromised or manipulated. Availability impact is less direct but could occur if form processing is disrupted. Organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if personal data is exposed or mishandled. The vulnerability's ease of exploitation and lack of user interaction requirement increase the threat level. Given Grav's popularity in European small and medium enterprises and web agencies, the risk is non-trivial.

Mitigation Recommendations

1. Upgrade all Grav installations to version 1.8.0-beta.27 or later immediately to apply the official fix. 2. Review and restrict editor permissions to the minimum necessary, avoiding granting access to modify form-related YAML frontmatter unless absolutely required. 3. Implement strict input validation and sanitization on form data and YAML frontmatter fields where possible. 4. Monitor administrative logs for unusual POST requests to /admin/pages/{page_name} that attempt to modify the data[_json][header][form] field. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious modifications to form processing data. 6. Conduct regular security audits and penetration testing focusing on CMS administrative interfaces. 7. Educate content editors about the risks of unauthorized changes and enforce strong authentication and session management controls to prevent account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-26T23:11:46.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692e0bb43937fa579fdf7d52

Added to database: 12/1/2025, 9:42:12 PM

Last enriched: 12/1/2025, 9:56:01 PM

Last updated: 12/1/2025, 10:56:13 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats