Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66302: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav

0
Medium
VulnerabilityCVE-2025-66302cvecve-2025-66302cwe-22
Published: Mon Dec 01 2025 (12/01/2025, 21:33:40 UTC)
Source: CVE Database V5
Vendor/Project: getgrav
Product: grav

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

AI-Powered Analysis

AILast updated: 12/01/2025, 21:56:36 UTC

Technical Analysis

CVE-2025-66302 is a path traversal vulnerability classified under CWE-22 affecting Grav CMS, a file-based web platform. The vulnerability exists in versions prior to 1.8.0-beta.27 within the backup tool component, where user-supplied paths are not properly sanitized or restricted to the intended webroot directory. This flaw allows authenticated attackers with administrative privileges to manipulate file paths and access arbitrary files on the underlying server filesystem outside the webroot. Since Grav CMS is file-based, unauthorized file reads can expose sensitive configuration files, credentials, or other critical data, compromising confidentiality. The vulnerability does not permit modification or deletion of files, nor does it affect system availability. Exploitation requires administrative authentication but no additional user interaction, and the attack can be performed remotely over the network. The vulnerability was publicly disclosed on December 1, 2025, with no known exploits in the wild at the time of publication. The issue is resolved in Grav CMS version 1.8.0-beta.27 by implementing proper input validation and path restriction mechanisms in the backup tool. The CVSS v3.1 base score is 6.8, reflecting a medium severity due to the high impact on confidentiality and the requirement for high privileges but ease of network exploitation without user interaction.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on Grav CMS platforms. Unauthorized file disclosure could lead to leakage of critical information such as configuration files, database credentials, or personal data protected under GDPR, potentially resulting in regulatory penalties and reputational damage. Since Grav CMS is used by various small to medium enterprises and public sector websites across Europe, exploitation could disrupt trust and operational security. The requirement for administrative privileges limits the attack surface to insiders or compromised admin accounts, but the ease of exploitation once authenticated increases risk. The vulnerability does not affect data integrity or availability, so direct service disruption is unlikely. However, the exposure of sensitive files could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations handling personal or confidential data should consider this vulnerability a priority for remediation to maintain compliance and security posture.

Mitigation Recommendations

European organizations should immediately upgrade Grav CMS installations to version 1.8.0-beta.27 or later, where the vulnerability is patched. Until upgrades can be applied, restrict administrative access to the Grav CMS backend using strong authentication mechanisms such as multi-factor authentication (MFA) and IP whitelisting to reduce the risk of credential compromise. Conduct regular audits of administrative accounts and monitor logs for unusual file access patterns indicative of exploitation attempts. Implement web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the backup tool endpoints. Additionally, isolate Grav CMS servers within segmented network zones with limited access to sensitive backend systems and files. Educate administrators on the risks of this vulnerability and enforce the principle of least privilege to minimize the number of users with administrative rights. Finally, perform regular backups and verify their integrity to ensure recovery capability in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-26T23:11:46.394Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e0bb43937fa579fdf7d4a

Added to database: 12/1/2025, 9:42:12 PM

Last enriched: 12/1/2025, 9:56:36 PM

Last updated: 12/1/2025, 10:55:25 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats