Grav vulnerability allows arbitrary code execution and elevated privileges
CVE-2024-28119
8.8HIGH
What is CVE-2024-28119?
Grav, an open-source flat-file content management system, is subject to a vulnerability that allows an attacker to exploit unrestricted access to the Twig extension class within the Grav context. Prior to the release of version 1.7.45, any administrative user with the permission to create or edit pages could enable Twig processing of static pages in the front matter. This unsandboxed behavior permits the redefinition of the escape function, potentially leading to arbitrary code execution and privilege escalation within the Grav instance. Version 1.7.45 has implemented a patch to mitigate this security issue.
Affected Version(s)
grav < 1.7.45
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
