Remote Code Execution Vulnerability in Grav CMS Product by Grav
CVE-2025-50286
8.1HIGH
Key Information:
Badges
๐พ Exploit Exists๐ก Public PoC๐ฃ EPSS 66%
What is CVE-2025-50286?
A vulnerability in Grav CMS v1.7.48 enables authenticated administrators to upload malicious plugins via the /admin/tools/direct-install interface. After upload, the plugin is automatically extracted and executed, which can lead to arbitrary PHP code execution and potential reverse shell access, posing a significant risk to the integrity of the system.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
66% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
