CVE-2025-66306: CWE-639: Authorization Bypass Through User-Controlled Key in getgrav grav
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.
AI Analysis
Technical Summary
CVE-2025-66306 is a security vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Grav CMS Admin Panel in versions prior to 1.8.0-beta.27. Grav is a file-based web platform used for content management. The vulnerability arises from an Insecure Direct Object Reference (IDOR) flaw, where low-privilege users can manipulate request parameters to access sensitive information belonging to other user accounts. Specifically, unauthorized users can retrieve admin email addresses and other metadata, which are not intended to be publicly accessible or viewable by non-privileged users. Although this flaw does not allow attackers to take over accounts directly or modify data, the exposure of sensitive metadata can facilitate secondary attacks such as phishing campaigns, credential stuffing, or social engineering. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges but no user interaction, and limited confidentiality impact without affecting integrity or availability. The flaw was publicly disclosed on December 1, 2025, and fixed in Grav version 1.8.0-beta.27. No known exploits have been reported in the wild to date. The vulnerability affects all Grav CMS installations running versions older than 1.8.0-beta.27 that have the Admin Panel enabled and accessible to low-privilege users.
Potential Impact
For European organizations using Grav CMS, this vulnerability primarily threatens the confidentiality of sensitive administrative metadata, such as email addresses. Exposure of such information can increase the risk of targeted phishing attacks, which are a common vector for initial compromise in many cyberattacks. Credential stuffing attacks may also be facilitated if attackers use leaked emails combined with password lists from other breaches. Social engineering risks rise as attackers gain insights into organizational structure and personnel. While the vulnerability does not allow direct account takeover or system compromise, the indirect risks can lead to significant security incidents if attackers leverage the exposed information effectively. Organizations in sectors with high phishing risks, such as finance, government, healthcare, and critical infrastructure, may face elevated threats. Additionally, the presence of low-privilege users with access to the Admin Panel increases the attack surface. The impact is thus moderate but can cascade into more severe breaches if combined with other vulnerabilities or weak security practices.
Mitigation Recommendations
European organizations should immediately upgrade Grav CMS installations to version 1.8.0-beta.27 or later to remediate this vulnerability. If immediate patching is not feasible, restrict access to the Admin Panel to only trusted and fully authorized users, employing network segmentation and IP whitelisting where possible. Implement strict role-based access controls (RBAC) to ensure that low-privilege users cannot access sensitive metadata. Monitor access logs for unusual or unauthorized attempts to access user data. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Conduct phishing awareness training for staff to mitigate risks from potential phishing attacks leveraging exposed email addresses. Regularly audit CMS configurations and user privileges to ensure compliance with the principle of least privilege. Finally, consider deploying web application firewalls (WAFs) with rules designed to detect and block suspicious parameter tampering attempts targeting the Admin Panel.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-66306: CWE-639: Authorization Bypass Through User-Controlled Key in getgrav grav
Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-66306 is a security vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Grav CMS Admin Panel in versions prior to 1.8.0-beta.27. Grav is a file-based web platform used for content management. The vulnerability arises from an Insecure Direct Object Reference (IDOR) flaw, where low-privilege users can manipulate request parameters to access sensitive information belonging to other user accounts. Specifically, unauthorized users can retrieve admin email addresses and other metadata, which are not intended to be publicly accessible or viewable by non-privileged users. Although this flaw does not allow attackers to take over accounts directly or modify data, the exposure of sensitive metadata can facilitate secondary attacks such as phishing campaigns, credential stuffing, or social engineering. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges but no user interaction, and limited confidentiality impact without affecting integrity or availability. The flaw was publicly disclosed on December 1, 2025, and fixed in Grav version 1.8.0-beta.27. No known exploits have been reported in the wild to date. The vulnerability affects all Grav CMS installations running versions older than 1.8.0-beta.27 that have the Admin Panel enabled and accessible to low-privilege users.
Potential Impact
For European organizations using Grav CMS, this vulnerability primarily threatens the confidentiality of sensitive administrative metadata, such as email addresses. Exposure of such information can increase the risk of targeted phishing attacks, which are a common vector for initial compromise in many cyberattacks. Credential stuffing attacks may also be facilitated if attackers use leaked emails combined with password lists from other breaches. Social engineering risks rise as attackers gain insights into organizational structure and personnel. While the vulnerability does not allow direct account takeover or system compromise, the indirect risks can lead to significant security incidents if attackers leverage the exposed information effectively. Organizations in sectors with high phishing risks, such as finance, government, healthcare, and critical infrastructure, may face elevated threats. Additionally, the presence of low-privilege users with access to the Admin Panel increases the attack surface. The impact is thus moderate but can cascade into more severe breaches if combined with other vulnerabilities or weak security practices.
Mitigation Recommendations
European organizations should immediately upgrade Grav CMS installations to version 1.8.0-beta.27 or later to remediate this vulnerability. If immediate patching is not feasible, restrict access to the Admin Panel to only trusted and fully authorized users, employing network segmentation and IP whitelisting where possible. Implement strict role-based access controls (RBAC) to ensure that low-privilege users cannot access sensitive metadata. Monitor access logs for unusual or unauthorized attempts to access user data. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Conduct phishing awareness training for staff to mitigate risks from potential phishing attacks leveraging exposed email addresses. Regularly audit CMS configurations and user privileges to ensure compliance with the principle of least privilege. Finally, consider deploying web application firewalls (WAFs) with rules designed to detect and block suspicious parameter tampering attempts targeting the Admin Panel.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-26T23:11:46.396Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e0ef03937fa579fe46181
Added to database: 12/1/2025, 9:56:00 PM
Last enriched: 12/8/2025, 10:12:13 PM
Last updated: 1/16/2026, 1:32:53 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65118: CWE-427 in AVEVA Process Optimization
HighCVE-2025-65117: CWE-676 in AVEVA Process Optimization
HighCVE-2025-64769: CWE-319 in AVEVA Process Optimization
HighCVE-2025-64729: CWE-862 in AVEVA Process Optimization
HighCVE-2025-64691: CWE-94 in AVEVA Process Optimization
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.