Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66844: n/a

0
High
VulnerabilityCVE-2025-66844cvecve-2025-66844
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-66844 is a Server-Side Request Forgery (SSRF) vulnerability affecting Grav CMS versions prior to 1. 7. 49. 5. The flaw arises when Twig templates process page content and the configuration permits registration of undefined PHP functions, enabling attackers to trigger SSRF. Exploitation could allow attackers to make unauthorized requests from the server to internal or external systems, potentially exposing sensitive data or enabling further attacks. No known exploits are currently reported in the wild. The vulnerability requires the ability to influence Twig template content and configuration settings, which may limit exploitation scope. European organizations using Grav CMS with vulnerable versions are at risk, especially those with publicly accessible Grav-based websites. Mitigation involves updating Grav to version 1.

AI-Powered Analysis

AILast updated: 12/15/2025, 16:15:57 UTC

Technical Analysis

CVE-2025-66844 is a vulnerability in Grav CMS, a flat-file content management system widely used for building websites. The issue exists in versions prior to 1.7.49.5 and involves Server-Side Request Forgery (SSRF) triggered via Twig template processing. Twig is the templating engine used by Grav to render page content. When Grav processes page content through Twig, if the configuration allows registration of undefined PHP functions, an attacker can craft malicious template content that invokes SSRF vectors. This means the attacker can cause the server to send HTTP requests to arbitrary internal or external resources. SSRF can be leveraged to access internal services not normally exposed, scan internal networks, or exfiltrate sensitive information. The vulnerability does not require known authentication if the attacker can inject or influence Twig template content, which might be possible via content management interfaces or other injection points. No public exploits have been reported yet, but the vulnerability is published and should be considered a significant risk. The lack of a CVSS score indicates this is a newly disclosed issue. The vulnerability's impact depends on the server's network environment and the attacker's ability to control Twig templates and configuration. The flaw highlights the risk of enabling undefined PHP function registration in Twig, which should be disabled unless explicitly needed. Grav CMS users should prioritize patching and configuration review to prevent exploitation.

Potential Impact

For European organizations, the SSRF vulnerability in Grav CMS could lead to unauthorized internal network reconnaissance, data leakage, and potential pivoting to more critical internal systems. Organizations hosting public-facing Grav websites are at risk of attackers exploiting this flaw to access internal services such as databases, metadata services in cloud environments, or administrative interfaces not intended for external access. This could compromise confidentiality and integrity of sensitive data and disrupt availability if internal services are overwhelmed or manipulated. The impact is heightened for organizations with complex internal networks or those using cloud infrastructure where SSRF can access cloud metadata endpoints. Given the widespread use of Grav CMS in Europe for small to medium business websites, government portals, and educational institutions, the vulnerability poses a significant threat. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid exploitation once public proof-of-concept code emerges is high.

Mitigation Recommendations

1. Upgrade Grav CMS to version 1.7.49.5 or later, where this vulnerability is fixed. 2. Review and disable the configuration option that allows registration of undefined PHP functions in Twig templates unless absolutely necessary. 3. Restrict user input that can influence Twig templates to trusted users only and implement strict input validation and sanitization. 4. Employ network segmentation and firewall rules to limit the server's ability to make arbitrary outbound requests, especially to internal network resources and cloud metadata endpoints. 5. Monitor web server and application logs for unusual outbound requests or template processing errors that could indicate exploitation attempts. 6. Conduct regular security audits of Grav CMS configurations and template usage to ensure no insecure settings are enabled. 7. Consider implementing Web Application Firewalls (WAFs) with custom rules to detect and block SSRF payload patterns targeting Grav CMS. 8. Educate developers and administrators about the risks of enabling undefined PHP function registration in templating engines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69403091d9bcdf3f3de86a15

Added to database: 12/15/2025, 4:00:17 PM

Last enriched: 12/15/2025, 4:15:57 PM

Last updated: 12/15/2025, 8:16:28 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats