Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66843: n/a

0
Medium
VulnerabilityCVE-2025-66843cvecve-2025-66843
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

grav before v1.7.49.5 has a Stored Cross-Site Scripting (Stored XSS) vulnerability in the page editing functionality. An authenticated low-privileged user with permission to edit content can inject malicious JavaScript payloads into editable fields. The payload is stored on the server and later executed when any other user views or edits the affected page.

AI-Powered Analysis

AILast updated: 12/22/2025, 16:58:04 UTC

Technical Analysis

CVE-2025-66843 is a stored cross-site scripting (Stored XSS) vulnerability identified in Grav CMS versions prior to 1.7.49.5. Grav is a flat-file content management system widely used for website management. The vulnerability exists in the page editing functionality, where an authenticated user with low-level permissions to edit content can inject malicious JavaScript payloads into editable fields. These payloads are stored persistently on the server and executed in the browsers of any users who subsequently view or edit the affected page. This stored XSS attack vector enables attackers to perform actions such as session hijacking, credential theft, or unauthorized actions within the context of the victim’s browser session. The vulnerability requires the attacker to have authenticated access with content editing rights, and user interaction is necessary for the payload to execute. The CVSS v3.1 base score is 5.4, indicating medium severity, with an attack vector of network, low attack complexity, privileges required at the low level, and user interaction required. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits or active exploitation in the wild have been reported to date. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

For European organizations using Grav CMS, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data. Attackers with low-privileged content editing access can inject malicious scripts that execute in other users’ browsers, potentially leading to session hijacking, unauthorized actions, or data theft. This can undermine trust in affected websites, lead to data breaches, and facilitate further attacks such as privilege escalation or lateral movement. While availability is not impacted, the reputational damage and potential regulatory consequences under GDPR for data exposure could be significant. Organizations in sectors with high web presence such as media, government, education, and e-commerce are particularly at risk. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with many content editors or weak internal access controls.

Mitigation Recommendations

European organizations should immediately upgrade Grav CMS to version 1.7.49.5 or later where this vulnerability is patched. Until patching is possible, restrict content editing permissions strictly to trusted users and implement the principle of least privilege. Employ web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting Grav CMS. Conduct regular security training for content editors to recognize and avoid injecting unsafe content. Enable Content Security Policy (CSP) headers to limit the impact of any injected scripts. Monitor logs for unusual editing activity or unexpected script injections. Perform regular vulnerability scans and penetration tests focusing on web application security. Additionally, review and sanitize all user-generated content before publishing. Implement multi-factor authentication (MFA) for all users with editing privileges to reduce risk of compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69403091d9bcdf3f3de86a18

Added to database: 12/15/2025, 4:00:17 PM

Last enriched: 12/22/2025, 4:58:04 PM

Last updated: 2/7/2026, 2:27:39 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats