Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66306: CWE-639: Authorization Bypass Through User-Controlled Key in getgrav grav

0
Medium
VulnerabilityCVE-2025-66306cvecve-2025-66306cwe-639
Published: Mon Dec 01 2025 (12/01/2025, 21:46:00 UTC)
Source: CVE Database V5
Vendor/Project: getgrav
Product: grav

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.

AI-Powered Analysis

AILast updated: 12/08/2025, 22:12:13 UTC

Technical Analysis

CVE-2025-66306 is a security vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Grav CMS Admin Panel in versions prior to 1.8.0-beta.27. Grav is a file-based web platform used for content management. The vulnerability arises from an Insecure Direct Object Reference (IDOR) flaw, where low-privilege users can manipulate request parameters to access sensitive information belonging to other user accounts. Specifically, unauthorized users can retrieve admin email addresses and other metadata, which are not intended to be publicly accessible or viewable by non-privileged users. Although this flaw does not allow attackers to take over accounts directly or modify data, the exposure of sensitive metadata can facilitate secondary attacks such as phishing campaigns, credential stuffing, or social engineering. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with the vector indicating network attack vector, low attack complexity, requiring privileges but no user interaction, and limited confidentiality impact without affecting integrity or availability. The flaw was publicly disclosed on December 1, 2025, and fixed in Grav version 1.8.0-beta.27. No known exploits have been reported in the wild to date. The vulnerability affects all Grav CMS installations running versions older than 1.8.0-beta.27 that have the Admin Panel enabled and accessible to low-privilege users.

Potential Impact

For European organizations using Grav CMS, this vulnerability primarily threatens the confidentiality of sensitive administrative metadata, such as email addresses. Exposure of such information can increase the risk of targeted phishing attacks, which are a common vector for initial compromise in many cyberattacks. Credential stuffing attacks may also be facilitated if attackers use leaked emails combined with password lists from other breaches. Social engineering risks rise as attackers gain insights into organizational structure and personnel. While the vulnerability does not allow direct account takeover or system compromise, the indirect risks can lead to significant security incidents if attackers leverage the exposed information effectively. Organizations in sectors with high phishing risks, such as finance, government, healthcare, and critical infrastructure, may face elevated threats. Additionally, the presence of low-privilege users with access to the Admin Panel increases the attack surface. The impact is thus moderate but can cascade into more severe breaches if combined with other vulnerabilities or weak security practices.

Mitigation Recommendations

European organizations should immediately upgrade Grav CMS installations to version 1.8.0-beta.27 or later to remediate this vulnerability. If immediate patching is not feasible, restrict access to the Admin Panel to only trusted and fully authorized users, employing network segmentation and IP whitelisting where possible. Implement strict role-based access controls (RBAC) to ensure that low-privilege users cannot access sensitive metadata. Monitor access logs for unusual or unauthorized attempts to access user data. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Conduct phishing awareness training for staff to mitigate risks from potential phishing attacks leveraging exposed email addresses. Regularly audit CMS configurations and user privileges to ensure compliance with the principle of least privilege. Finally, consider deploying web application firewalls (WAFs) with rules designed to detect and block suspicious parameter tampering attempts targeting the Admin Panel.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-26T23:11:46.396Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e0ef03937fa579fe46181

Added to database: 12/1/2025, 9:56:00 PM

Last enriched: 12/8/2025, 10:12:13 PM

Last updated: 1/16/2026, 1:32:53 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats